Vol2 Issue #33 ****************************************************************************** Vol.Two Issue #33 The Surveillance List Feb.1,1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Electronics Workbench 02) re: weekly 03) Need Help 04) Missing Posts ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: Electronics Workbench To the Moderator: I got the literature from Wrightline and a rep came by. Unbelievably expandable. The electrical distribution and cable management, the personal grounding kits, static dissipative laminate, spectrum shelving system and other numerous assets make it a great choice. I noticed they even sell static dissipative seating & bins. I am very impressed; which takes some doing. Although I haven't ordered a system yet, I feel sure that once I have, I will be recommending them to everyone. Thanks so much for the referral. -- Trace Carpenter, PI, TSCM 214.828.4520 214.828.1917 Facsimile +++Moderator's Note+++ I ordered and received mine about a year ago and I love it... My system is 7 foot high and configured to fit in corner of room. Three racks of shelving plus 16 feet of counterspace (eight feet in both direction). All my bench equipment is right at my fingertips... The system ran about seven thousand USD with all the options I ordered but well worth it... this system is so sturdy the Green Bay Packers could stand on it... ************************************************************************** 2)From: "Captain" Subject: re: weekly Absolutely I must disagree. The daily format is by far the best way for me. I find myself checking the mail more often than usual just to get the list "hot off the press". IMO it is just fine the way it is. The Captain ************************************************************************** 3)From: "MICHAEL J.&BARBARA L.POLI" Subject: Need Help I AM A NEW MEMBER TO THE SURVEILLANCE LIST. I AM INTERESTED IN HELPING A FRIEND FIND HER REAL MOTHER. IF ANY ONE CAN HELP ME PLEASE LET ME KNOW. THANK YOU. ************************************************************************** 4)From: SpyKing@thecodex.com Subject: Missing Posts We had a mail glitch and lost several posts. If you posted something in the last two days to the list and it has not appeared yet please resend. Sorry for the inconvenience. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue #34 ****************************************************************************** Vol.Two Issue #34 The Surveillance List Feb.2,1997 Over 1300 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Pro-34 02) Re: Intercepting beepers 03) Screen Rooms 04) Re: Parabloic Microphones 05) Confusion on Paging 06) re RM-1 07) Optoelectronics Xplorer 08) Re: Fiberoptic Interception 09) Re: Anonymous remailers 10) MDTs & new item 11) Info Brokers 12) Daily or weekly distribution ? 13) Re: fiber optics 14) Re: Cloned Beeper (to catch a thief) 15) Rad Shk Close Out 16) Intro 17) Re: Microphones 18) ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: Pro-34 > Okay, I give up. I removed the cover from my Realistic Pro-34 and have > spent four days with a magnifying glass trying to locate D11. I can't > find any visible D followed by less than three digits. Can anyone give > me a clue to the location of D11 (for educational purposes only, of > course)? Gus, what I've experienced with several scanners is the diode may be beneath a metal plate which is soldered to a circuit board. If your scanner has such a metal sheild (it should), then temporarily desolder it and poke around. You may also consider spending a few bucks on a PRO-34 manual (which includes schematics) from Radio Shack. They usually prove useful several times over for those who're always tinkering with radio guts. Don't get too frustrated, just look carefully. CrACKeD ************************************************************************** 2)From: CrACKeD Subject: Re: Intercepting beepers >If I know somebody's beeper number, is there a way to intercept all >messages/numbers that are sent to this number?? First, find out what frequency the targets paging service uses. Next, build or purchase a POCSAG decoder interface such as that available from www.l0pht.com (very small unit, fits in a DB25 hood and is very portable). This interface will work with simple DOS software called PD (POCSAG Decoder). The shareware version of PD is available at this URL: www.bearnet.demon.co.uk/pocsag/index.htm You will connect the interface to the audio output of radio receiver, but preferably the discriminator output for much greater decoding accuracy and reliability. Most pages sent over the air will not include a pager number, but a cap code. Figuring out a cap code should be obvious. Simply page the target number with something bogus you can remember and look for the page to show up on your screen. The cap code will precede the bogus message. PD, when registered, has the ability to highlight, beep and log to disk specific decoded pages based on a cap code. This is really unbelievably simple to do. A dedicated POCSAG decoding machine can be setup for somewhere around fifty bucks and an evening worth of slapping together old hardware and soldering together a simple kit. CrACKeD ************************************************************************** 3)From: Ron Carper Subject: Screen Rooms Greetings: Interested in contacting vendor that supplies materials to build a 'screen room'. ron@tecs.com http://www.tecs.com/pips ************************************************************************** 4)From: Spysociety@aol.com Subject: Re: Parabloic Microphones Well Sam, there's this mail order company called U.S. Cavalry at (888) 888-7228 or (800) 777-7172. They sell this item called Bionic Ear along with the Bionic Ear Booster which is a parabolic microphone. This unit claims to enable one to hear a whisper from 50 yards or game a mile away, and the Booster increases the listening surface by 37 times and reduces backround noise too. It includes headphones with volume control and is tape-jack equipped as well. The catalog #'s are N4503 for the Bionic Ear at $109.95 and N4502 for the Booster at $39.95. And I believe they have a money back guarantee too. +++Moderator's Note+++ Silver Creek Industries of Manitowac, Wi. is the manufacturer of the Bionic Ear. You can contact them directly at: Tel: 414-684-1225 Fax: 414-684-6267 and save yourself a couple of bucks... Dealer price around $58.00 ************************************************************************** 5)From trever.kb9nhu@juno.com (Trever C. Trader) Subject: Confusion on Paging Jake: When you clone a pager, you don't get double billed, you get billed for one pager. the paging company only can see one pager, you clone the pager so that the duplicate pager receives the same pages as the original. Just like when you clone a cell-phone, the tower see's it as a single phone, the cellular company doesn't bill them for two phones, if they did, then they could see cloning as it happens, and stop it as soon as it starts. By less people involved, do you mean the person you buy the pager from? All that you need to know it the protocol, baud rate, and frequency. Anyway, cloning should be left to professionals who know their stuff, it is not like you will always be around to repage the original person with their pages, and with your way, you do get two bills. the original pager which you steal, and the pager you pay for for them to use. Cloning can be a cheaper, easier, and more high-tech way to go about it for most people. I would like feedback from some of the other readers on the list about the two ways, and which would seem to work more efficiently. Thank you: Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** 6)From: Graham Subject: re RM-1 RM-1 long range FM mic I have had an amazing response to my offer of the cct diag to members on the Surveillance List so I have decided to supply a kit of parts to members. The kit will include all parts including PCB 29mm * 18 mm except for battery and case. RM-1 as a Kit Aud $60 includes pack post and airmail. Regards Graham ------------------------------------------------------------------------------- SpyCam Surveillance Web site...http://www.ozemail.com.au/~spycam Postal Address P.O. Box 7143 East Brisbane Qld 4169 Australia ************************************************************************** 7)From: Graham Subject: Optoelectronics Xplorer Has anybody tried the Xplorer from optoelectronics? How does it compare to the R10 interceptor and the Scout? Regards Graham ************************************************************************** 8)From: "C. Kuethe" Subject: Re: Fiber Optic Intereception? > 11)From: "William Ehrendreich" > Subject: Fiber Optic Intereception? > > There seems to be an interesting brain trust in on this list so lets see if > you gents can assemble an answer on a technical question..... > > You need to monitor communications under these conditions. > > 1. Can't get on site.... risk factor too high > 2. Communications are carried from the facility on > fiber but you know where it lies.... > 3. They monitor link integrity... means you must > investigate in a less than invasive manner > > There is a way.... lets see if you physics gurus out there can come up with > an answer > > William Ehrendreich Well that sounds like fun to me. Let me ask some questions first. 1) Is there some place where I can have unobserved cable access? 2) How often is link integrity monitored? 3) What is link integrity? (SNR > 65dB, absolute intensity, etc) 4) Cable specs please... 5) frequency of the light Off the top of my head here's a brief answerlet... I'm assuming the cable has a constant carrier wave and this is always monitored. A guy paid to watch that the "Carrier Detect" light on the fibre optic transceiver never goes out. If it does push that big red button, or some other 'system'. So even if there is no actual data flowing, there's still a continuous carrier wave... like a modem. The alarm goes if there's a carrier drop for more than .05 sec. You cannot therefore cut, splice and fuse the cable... no time. Here's what we do... fibre optics use total internal reflection (TIR) to keep light inside and just bounce it off the walls. The formula to determine what angle you can put light into the fibre at (cone of acceptance) is angle =90-invsin( n2/n1 ) where n1 and n2 are the indices of refraction of the cladding (outside) and the core (inside) respectively. This give you an angle with respect to the central axis of the fibre. A light ray impacting on the surface will reflect just like a mirror if it's angle of incidence is less than or equal to that of the cone of acceptance. if it's greater, it just leaks out the sides... But how do we adjust the angle of incidence, seeing as the target set it up right? simple... bend the cable light leaks... this is how we intercept the signal. You don't have TIR anymore... IR but it isn't total. Now we strip the jacket off a small part of the cable exposing the fibre. By now you should have all phoned the local telco and asked them about their fibre optic services... what kind of cable they use. Then you should have acquired some of this cable from somewhere. Lay your fibre next to the one to be monitored. Give it one full wrap around. Hook up your detector to your cable, and bend the two cables together into a loop. By doing this you make it possible for light to hit the wall at something less than the critical angle, causing it to refract out. the paralle cable is bent the same way, and the interface order is reversed, so you now have the signal captured... not too much though... more bend means more attenuation and that'll get you noticed if you're sloppy. In the last 4 years scientific american published an article where something like this was mentioned... I'll try get the reference. If anyone wishes a slightly more mathematical version of this plan, let me know, and I'll send you a proof. PLUR chris -- Chris Kuethe LPGV Electronics and Controls http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: Re: Anonymous remailers > 13)From: "Steven R. Price" > Subject: Anonymous remailers > > Look to 'http://pgp.rivertown.net' for links to what ails you. Also see: 'http://www.stack.nl/~galactus/remailers/' PLUR Chris ps... daily list ************************************************************************** 10)From: nrp@camtech.net.au Subject: MDTs & new item Just to let you know that I have found the Forum very interesting. I would appreciate it very much if you could forward a copy of the article on MDTs to me by e-mail. Thank you. Also, came across this while checking alt. security.tscm A completely solid state voice recorder is detailed at the following: www.darpa.mil\asto\small.talk.html This is being developed for the DoD by a firm in California, and it has a very low LPD. it could probably be disguised as a pager if the size mentioned is the real size. This may be of interest to other members. +++Moderator's Note+++ The Small Talk recorder IS very interesting. It was mentioned on the Surveillance List in one of the first issues... ************************************************************************** 11)From: Located@aol.com Subject: Re: Info Brokers Hello List.. The attached list of Information Brokers might be of assistance to those of us that use them. Happy reading....
Subj:  Info Services
Discovery Investigative Services
Your Northern California PI  (San Francisco Bay Area)
1-800-393-7794        


I hope this Helps...


>Acc-U-Data  http://www.totcon.com/accudata
>ACCU-SEARCH  215 781 7922 Kennard Buffaloe brothaken@earthlink.net
>AccuSource  214-637-5006 http://www.ticnet.com/as
>ACM Research http://www.angelfire.com/biz/investigator/index.html
>AFFILIATED FINANCIAL RESOURCES 8007211249 9043227703 - Fax Scott Farrell   
> 
>American Universal http://www.redrock.net/auw.html
>AmeriFact 12166157600 12166157666  Fax Troy Miller 4500 Rockside Road Suite
>220 Cleveland, OH 44131
>Apex Information Services 13346777357 13347024188 Fax  Post Office Box 6111
>Dothan, AL 36302 Dothan, AL  36301  INTLPI@aol.com Matt Scott
>Atlas Information Services 13526664371 13526664373 Fax
>http://www.pimall.com/atlas/  CJ and Jenny Bronstrup PO Box 463 Aripeka, FL
>34679
>Background Information Services, Inc. Boulder, CO.  Tel 800-433-6010.
>Bankruptcy Services Inc. 18006226878 2000 N Central Expwy, Suite 215 Plano,
>Tx 75074 E-mail: rceubanks@aol.com  Fax# 214-424-6500  800-256-2800
>President: Ronald C. Eubanks 
>Bearak Reports 18003315677 modem 15086206666
>Ralph Bergin Jr. - 412-563-1801
>C D B Infotek 18004273747 17147081000 Fax Six Hutton Centre Santa Ana, Ca
>92707-5707  http://www.cdb.com
>Claims Research and Loss Prevention Group, Inc. 18004520636 8139487761 Fax
>8139487662 voice PO Box 2576 Lutz, FL 33549-2576
>Credit-Facts of America 18002334747 18003322317 Fax 530 William Penn Place,
>Suite 120 PO Box 133 Pittsburgh, PA 15219 E-mail: weritz@cfacts.com 
>http://www.cfacts.com/www/weritz
>CreditMaster http://www.trcone.com/cmi.html
>CT Corporation System 18008748820 18008283066 Fax  49 Stevenson Street, Ste
>300 San Francisco, Ca 94105
>Data Discovery  http://www.teleport.com/~peterc
>Data File Services, Inc.  18003313282 18189094717 Fax 6060 Sepulveda Blvd.,
>Suite 200 Van Nuys, Ca 91411  http://www.uccdirrect.com/ucc
>Database Technologies, Inc (DBT) 18002797710 100 East Sample Road, #200
>Pompano Beach, Fl 33064
>DCS Information Systems 18002993647 12144223600 Andy or Ted Wemhoff 500 N.
>Central Exp  Suite 280 Plano, TX  75074
>Dig Dirt  19084645606 19084649148 Fax Mike Moore PO Box 80 Berkeley
>Heights, NJ 07922 digdirt@ix.netcom.com
>http://www.pimall.com/moore/moore.html
>Diligent Data - IDS Steve Harris
>http://www.logical.net/users/steveh/ddshome.htm
>Discreet Research  David Moskowitz  7154 N University Drive Tamarac, FLA 
>33221
>DocuSearch  http://docusearch.com/
>Empire Data Systems 18009557448
>CBI/Equifax 5505 Peachtree Dunwoody, #600 Atlanta, GA  30374-0241 Automated
>phone:  800-685-1111 800-685-5000 http://www.ends.com/
>Fast Data InfoSource 18005451928 14024987101  2301 North 117th Ave Omaha,
>NE, USA 68164-3682
>First Inc. 18008513255 18606841198 Fax Reid Geilich  
>http://www.firstinc.com
>Global Information Systems 18006718001
>Hi-Tech Information Resources 18002165277 Doug Spaulding
>Hunter Gatherers http://wheel.dcn.davis.ca.us/~nthorn/hunter.html
>Infinity Information Network, Inc. 4516 Kenny Road, Suite 203 Columbus, Oh
>43220-3711 E-mail: jw2@ganet.net  614-261-1213 Fax# 614-268-3485 
>http://www.synergy.smartpages.com/infinityinfo 
>Info AmeriQuest 701 East Franklin Street, # 1412 Richmond, VA 23219 1911 N.
>Ft. Myer Dr., #702 Arlington, VA 22209  800-777-8567  800-945-7339 Fax#
>703-807-5375
>InfoAmerica 18005329876
>Infonet http://www.infi.net/~dgs.assc/locator/bgrndnfo.html
>Information America 600 West Peachtree St. NW Atlanta, GA 30308 
>800-235-4008  http://www.infoam.com
>InformationForBusiness 5729 Graves Ave Encino, Ca 91316  800-466-9517 Fax#
>818-881-7579  info@info4business.com http://www.info4business.com
>InfoTrack 18002755594 
>Insights, Inc.  http://isis.iah.com/insights/background/ 
>Integrity National 18003458847
>Interactive Information Resource Systems 18886884477
>http://www.iglou.com/iirs_investigate
**************************************************************************
12)From t_robarts@hands-on.ltd.uk  
Subject: Daily or weekly distribution ?
 
Distribution of this list on a weekly basis is not a good idea and would be
a step backwards. Like other list members, I open my email with eager anticipation every morning in order to read the Surveillance List of the day! 

The list is IMO very well moderated and contains the right number of
postings and the right amount of detail to be easily manageable on a daily
basis. 

This would not be the case if I had to plough through the output of a whole
week all in one day. It would not be a pleasure nor would it be practicable. Surely the list member who cannot cope with distribution of this List on a
daily basis could be offered a facility of being able to access the archived
files of the Surveillance List at his own convenience.

"If it ain't broke, don't try to fix it"

Regards

Timothy Robarts
t_robarts@hands-on.ltd.uk 

+++Moderator's Note+++

I AM working on that archive but do to business committments it's slow in coming. I hope to have it up in a few weeks...  
**************************************************************************
13)From: everett@ionet.net (Glen Wicker)
Subject: Re: fiber optics

>Subject: Fiber Optic Intereception?
>"William Ehrendreich" 
>You need to monitor communications under these conditions.
>1. Can't get on site.... risk factor too high
>2. Communications are carried from the facility on
>   fiber but you know where it lies....
>3. They monitor link integrity... means you must 
>   investigate in a less than invasive manner

Fiber optics Surveilance can be monitored two ways that I have noticed, 
depending on what type of fiber dedication they are using. One method
would be risky, installing your own "monitor" using a Fiber Optic transciever
in-line that can re-transmit the signal with minimum delay. Then with
the monitor in place, compression and encryption would have to be configured,
not an easy job unless you have an Intelligence department handy. 
The other method is more elusive, Tempest monitoring of both communications
sitescan bring great results, that is of course the data is on a computor screen. 

Good Luck, Glen
Internet/Intelligence Consultant
G. Everett Wicker
everett@ionet.net
918.664.1350
Intelligence Web Link
http://www.ionet.net/~everett/index.shtml
**************************************************************************
14)From: Trace Carpenter 
Subject: Re: Cloned Beeper (to catch a thief)
 

When you clone a beeper, no one including the beeper company knows you 
have done it.  You are taking a compatable pager and placing it on the 
same frequency and programming it with the same cap code.  I could do 
yours from here and no one would know.
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
15)From: Trace Carpenter 
Subject: Rad Shk Close Out
 
The model cat number of the 8MM VCR you wanted is 14-409; I have secured 
three, and only know of one more in the Texas area, but here's how to 
find one.  Call your local RadShk and tell them to check the number.  If 
they don't have one ask them to look in "Perpetual".  This is the mode 
of their system which will check all stores in the district.  THey can 
then tell you who has them.
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
16)From: JoeSleuth@aol.com
Subject: Intro 

lion investigation academy 434 clearfeild st bethlehem pa. a.s.t.
degree program and forensic courses distant learning programs 1 800 637 7507
licensed school by pa dept of ed.
**************************************************************************
17)From: Al Thompson 
Subject: Re: Microphones

This is a resend, since I didn't see it go through the first time.  
Ignore if it's a dupe.

> 9)From: "Samuel A. Graham, Jr." 
> Subject: Microphone(s) - Enhanced Audio
> 
> I am trying to find a highly sensitive,  highly directional microphone
> that I can use to sit on the sidelines during military exercises and
> hear what is going on with my troops.  The information that I would
> receive would be extremely useful in getting actual feedback from the
> guys on the ground and writing realistic training scenarios.  This
> information once incorporated into a training scenario would serve to
> extend the livelihood of the guys on the ground.  We already take live
> video ---  but would definitely like to get the audio that we could
> associate with the action.  As always,  a source,  price and your help
> would be appreciated.
> 
> Sam Graham
> Base Level War Planning and Mobility Superintendent
> SamGraham@AmericaMail.Com

There is one specialty mic that I've tried which would probably be the 
best for your application - it is called the 'Bionic Ear.' It is a 
battery-powered mic with a moderate size (16"?) black plastic parabolic 
reflector.  It has an audio out connector to go to your recorder.  The 
electronics also have automatic gain control, which would be crucial for 
you to be able to pick up voices at a distance, yet not be overwhelmed by 
gunfire, vehicle noise, etc.  You can also connect a pair of headphones 
directly to the microphone, so you know what you are getting.  That saves 
having extra cords running to/from your recorder.
 
The plastic seems very durable, and would be fairly easy to weather-proof 
to an extent.  This, combined with the automatic gain control and 
built-in monitoring capability would be ideal.  It is also reasonably 
priced compared to "pro-grade" shotgun mics from Sennheiser or AKG.  The 
pro-grade mics are more fragile, and would require external gain-limiting 
circuitry and a monitoring amp.

Be aware though, that if there's much gunfire or extraneous loud noise
(helicopters, BFVs, CAS, etc) you won't be able to pick up voices over
that din unless they are facing you and yelling (not too realistic).  
Also, the action of the gain control may very well make the tape 
unlistenable. 
 
You don't say what size group you need to listen to.  If it is squad or
platoon-level, you may also consider having each of them wear a
vox-activated xmitter such as the cheapo Maxon (range of about 1/4 mile). 
Put them all on the same frequency, and you just monitor and record that
frequency.  They are small enough that they probably wouldn't interfere
with NODs. Be sure to yank the earphones so they don't start to depend on 
having their own personal tactical comms.  (grin)  They are about $50 
retail, so the Army can probably get them for $20 each.  Giving one to 
each member of a platoon would probably cost about the same as the Bionic 
Ear, and would be a technically better, and more versatile solution.  
However, remember that they would all be transmitting on 49MHz - this may 
be an OPSEC concern.
**************************************************************************
18)
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol2 Issue # 35


******************************************************************************
Vol.Two Issue #35           The Surveillance List           Feb.3,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Monitoring Fiber Response  
02) Re: Looking for help  
03) Phillip Peart 
04) Web Site Hacking
05) Re: Screen Rooms 
06) Pager Interception Techniques? 
07) Bumper Beeper Theory
08) List of reliable remailers (fwd)
09) Pager Clones
10) New Product Info
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: Trace Carpenter 
Subject: Monitoring Fiber Response
 
> Subject: Fiber Optic Intereception?
> 
> There seems to be an interesting brain trust in on this list so lets see if
> you gents can assemble an answer on a technical question.....
> 
> You need to monitor communications under these conditions.
> 
>         1. Can't get on site.... risk factor too high
>         2. Communications are carried from the facility on
>             fiber but you know where it lies....
>         3. They monitor link integrity... means you must
>             investigate in a less than invasive manner
> 
> There is a way.... lets see if you physics gurus out there can come up with
> an answer

O.K. Bill, you've got my attention.  With the info you have supplied I have a variety of ways around the problem, but I don't think that they are what you're looking for.  Fiber is not my strong suit but I'll give it a shot.  Maybe Tim Johnson will take a shot at it; if so I'll be waiting to see his ideas.

First is there a simpler way to solve the problem.  Laser comes to mind, but you're indicating that we want to monitor the telco lines.  Next, I often find that while security might be tight at the Target end, it could easily be compromised at the other end, such as the end of the line being communicated to.  
I still don't think that's what you're leaning towards though so here are my last shots for now:

As we know, and for the members of the list that are not versed on the composition of fiber optic lines, they are made up of the actual fiber which carries the transmission. 
 
It is then surrounded by a "cladding" which is a glass compound, and then coated in a pvc coating of mulitple colors similar to your standard telco cable.  The glass compound has a different index of refraction than the fiber and is basically designed to reflect any light back into the fiber.  As I recall the actual fiber is only about 62 microns in diameter, and the total fiber with coating is about 125 microns in diameter which makes if fairly secure.  

As for splicing into the cable your options are limited.  You say they monitor cable integrity which means a cut would be instantly detected.  That being the case the simplist way to accomplish this task would be a diversion.  By that I mean a backhoe bite down the line.  Since you know where the cable runs by the time the backhoe bite was repaired you could have your splice in line.  The biggest problem with this idea is that a "T" in  a fiber line will cause a notable drop in "d's".  

Ruling out that idea, maybe this is what you're looking for.  Telco engineers have known for sometime that sharp bends in fiberoptic cable cause a problem known as "microcracks".  These microcracks occur in the bend and while they don't cause a problem with transmissions, they do penetrate through to the fiber and can cause an early degredation of the line.  Engineers for Digital Switch Corp. have indicated in the past that these microcracks can actually allow emissions to escape from the cable which can be monitored.

While that may or may not be what you were looking for I would take a more basic 
approach.  The fiber comes into the frame and is de-multiplexed at which point it goes to copper.  While you may not have access to the frame, one can, either by "engineering" the business office at the phone company, or by hacking into the switch as a local Dallas hacker used to do, install an extension line.  At that point you have an extension line made of copper going to a remote location. While you may not want to monitor it there, you can easily breech that line.

Well I may have taken the long way around the world and you may have a $1.25 way to accomplish the same task.  I'll be looking forward to hearing the answer.  Tim, you got any ideas?
-- 
Trace Carpenter, P.I., TSCM
214.828.4520
214.828.1917 Facsimile
**************************************************************************
2)From: Larry Braden 
Subject: Re: Looking for help

To All list members and Michael and Barbara Poli,

First of all, welcome to the "Spy King" net.  You will find it is a very friendly and helpful private investigation network.  It seems as though 
everyday there is an abundance of intense information going or coming 
through this net.  

Next, in your post, you stated you are trying to help find your
friend's "real mother."  I'm going to assume you mean the biological mother
(bmother.)  To start out you need to ask your friend a few questions:

1.) Was your friend adopted?  If so, in what state?  What date?
    What city?
2.) Does your friend know the biological parents names?
3.) If you have names of either parents, try the "switchboard"
    search engine.

Etc.....It goes on from there.  That is a good start.  To answer
your next question.  Yes, there are thousands of us professional
investigators throughout the United States that find biological parents or
missing persons all the time for a LIVING.  That means, we get paid for what
we do.

I am not wanting to hurt anyone's feelings or ruffle any feathers
just stating a fact.  I don't think  you would call your doctor up and ask
how to do a heart transplant, then attempt it yourself.    I am in no way
implying our profession is as complicated as the surgeon, just trying to
make a point.  Now, if we are talking about a indigent case that is a
different story.  E-Mail any of us privately with details and you are bound
to receive some assistance.

Last but not least, you also stated you are new to the net.  So when
I pass this on to you, I am definitely meaning it in a friendly and helpful
manner.  When you place a post on any net or send any E-Mail to anyone and
use all CAPITAL letters it is as if you are shouting at them or getting in
their face.  Just something I though you would like to know.

I hope I have assisted you in some small way.  If there is any other
way I can help, don't hesitate to contact us anytime.

Respectfully,
Larry Braden, Senior Investigator
Montrose Investigations
Montrose, CO
E-Mail at  Braden@rmii.com
or visit our home page at:
http://www.angelfire.com/co/WestCoPI
Co Lic.  L10-85587
**************************************************************************
3)From: Tony Cordwell 
Subject: Phillip Peart

-- Hi there
I subscribe to spyking and wanted to reply to an offer made y Phillip R 
Peart at fact@m130.aone.net.au
I received an undeliverable message from the server.
Is the email address ok, could you contamt Phillip and ask to contact me 
again with a fax or other contact address?
thanks 
Tony
                 Tony Cordwell
(Postal)         94 Glen Dhu Street, South Launceston, Tas, 7249, 
Australia.
(E-mail)         ac_cordwell@postoffice.stpatricks.tas.edu.au
(Amateur Radio)  vk7zac@44.136.221.46



**************************************************************************
4)From: "hahn" 
Subject: Web Site Hacking

can you tell me how to hack a homepage my friend hacked mine and i would
like to return the favor thanx

Wedge Antillies

e-mail:  hahn@snowhill.com

+++Moderator's Note+++

I'm sure you mean you would like to secure your web site from further penetration... because we all know that unauthorized entry into someone else's computer is illegal... I would suggest you read the Alt.2600 Hacking FAQ at: http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
You just might learn a trick ot two... about security that is... 
or the lack of it...
**************************************************************************
5)From: Trace Carpenter 
Subject: Screen Rooms

Regarding screen rooms.  If you don't get any good replies let me know 
and I'll get the info from some vendors at our other office.  On the 
other hand, I'm sure you know, they're very easy to build with copper 
screen overlapped and secured firmly.  Then you just have to filter the 
power lines coming in.  Let me know if you don't get any replies.
-- 

Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
6)From: Huge Cajones Remailer 
Subject: Pager Interception Techniques?

Assuming one is setup to intercept pager traffic and store and monitor 
capcodes, how does one find out what frequency to monitor? There are many frequencies. For instance, let's say I have a target pager number of 666-555-1234, how do I find out what pager company owns it and what 
frequency to monitor to capture capcode on? Please respond to list as this message is from an anonymous remailer.
**************************************************************************
7)From: "Someone Else..." 
Subject: Bumper Beeper Theory
 
Couldn't you build a Bumper Beeper that works off of the GPS satellite
system??

For instance:  A GPS unit (on the subjects car) could get its location
every few seconds and then trasmit it back to the Detective (or whoever is
conducting the surveillance).  If this was hooked up to a lap top running
Street Atlas USA, you could see on a map a blinking symbol where ever the
subjects car is.
						-Ethan
**************************************************************************
8)From: "C. Kuethe" 
Subject: List of reliable remailers (fwd)

Someone was asking about remailers... here's more of them... the forwarded
letter (below) is distributed weekly (i think) on Cypherpunks... I have not
heard any complaints about the accuracy of the information contained, so I
consider it genuine.  However, I have not heard millions of people singing the
praises of these remailers, either...  :)

PLUR
chris

--
Chris Kuethe  LPGV Electronics and Controls
         http://www.ualberta.ca/~ckuethe/
RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/          
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>   
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
To: cypherpunks@toad.com
Subject: List of reliable remailers

I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

To use it, just finger remailer-list@kiwi.cs.berkeley.edu

There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

For the PGP public keys of the remailers, finger
pgpkeys@kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list@kiwi.cs.berkeley.edu.

$remailer{"extropia"} = " cpunk pgp special";
$remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = " cpunk mix pgp hash latent cut post ek";
$remailer{'alpha'} = ' alpha pgp';
$remailer{'nymrod'} = ' alpha pgp';
$remailer{"lead"} = " cpunk mix pgp hash latent cut ek";
$remailer{"exon"} = " cpunk pgp hash latent cut ek";
$remailer{"haystack"} = " cpunk mix pgp hash latent cut ek";
$remailer{"lucifer"} = " cpunk mix pgp hash latent cut ek";
$remailer{"jam"} = " cpunk mix pgp hash latent cut ek";
$remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord";
$remailer{'nym'} = ' newnym pgp';
$remailer{"balls"} = " cpunk pgp hash latent cut ek";
$remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek";
$remailer{"middle"} = " cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{'cyber'} = ' alpha pgp';
$remailer{"dustbin"} = " cpunk pgp hash latent cut ek mix reord middle ?";
$remailer{'weasel'} = ' newnym pgp';
$remailer{"death"} = " cpunk pgp hash latent post";
$remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.
remailer@crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix)
(weasel squirrel)

The alpha and nymrod nymservers are down due to abuse. However, you
can use the nym or weasel (newnym style) nymservers.

The cyber nymserver is quite reliable for outgoing mail (which is
what's measured here), but is exhibiting serious reliability problems
for incoming mail.

The squirrel and winsock remailers accept PGP encrypted mail only.

403 Permission denied errors have been caused by a flaky disk on the
Berkeley WWW server. This seems to be fixed now.

The penet remailer is closed.

Last update: Mon 3 Feb 97 6:48:17 PST
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
nym      config@nym.alias.net             #**#+*#**-#+     4:51 100.00%
dustbin  dustman@athensnet.com            ---+-------+  1:50:51  99.99%
weasel   config@weasel.owl.de             ++++--+++++   1:09:14  99.85%
lead     mix@zifi.genetics.utah.edu       ++--++++++++    50:42  99.80%
balls    remailer@huge.cajones.com        ###*###+-- #     5:45  99.62%
squirrel mix@squirrel.owl.de              ++++--+++ +   1:07:30  99.46%
cyber    alias@alias.cyberpass.net        +*+ *++++*++    40:43  99.23%
winsock  winsock@rigel.cyberpass.net      -----------   3:42:43  99.09%
lucifer  lucifer@dhp.com                  +   ++++++++    47:05  99.03%
exon     remailer@remailer.nl.com          ##### #* *#     2:02  98.68%
middle   middleman@jpunix.com             ++.--.- ---+  5:48:30  98.23%
haystack haystack@holy.cow.net            ***#*+# *#-+    15:27  97.21%
extropia remail@miron.vip.best.com        ------- .-    6:28:55  96.31%
replay   remailer@replay.com               *   +++-***    15:53  93.06%
reno     middleman@cyberpass.net          +--+     --+  1:20:32  91.27%
mix      mixmaster@remail.obscura.com     +-.-_-*+     14:45:36  77.02%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien
**************************************************************************
9)From: Trace Carpenter 
Subject: Pager Clones

The following is an e-mail I answered this morning and thought some others on the list might be interested.

> First , thanks  for the info on frequencies for portable phones. I have
> a hand held PRO - 51
> from Radio Shack. Is there anything I can do to increase the range of
> reception, like a magnetic mounted antenna? Or do I need a better
> scanner ?
> Also, I wanted to find out how to clone or get a twin pager?  Do you
> only need the pager # ?
> Would greately appreciate this info ?

Glad to help on the phone freqs.  I think mine is on 934Mhz.  As for the scanner, a different antenna will help, but beware a high gain antenna can shorten battrey life. Also, if you have a specific target in mind:-) you can use a directional (yagi) type antenna.  That will allow you to only recieve in the direction your pointing.  Reasons for this are obvious.

As for pagers, I offer this information so you will know how to protect your beeper from unauthorized monitoring of course.  On a digital/alphanumeric pager you will need the frequency and capcode of the target.  If it is one of the old tone&voice beepers you'd need the tone.  As there are few voice pagers left, (although they're making a come back) we'll talk about the digital/alphanumeric.

If someone were after your messages they could get the frequency and capcode off the back of your pager in most cases.  I erased mine for that reason.  Many pagers can be placed into test mode by sequencing the buttons which will also give the capcode.  As for the frequency, that's easy. The pager company only uses one or two freq's usually and places hundreds of cap's under it.  To obtain the info with only the telephone number, one could easily pretext that info from the paging company.  To stop that, put a passcode on your account and require the company to verify the passcode before giving out any info.

Once you have the freq & code find a compatible pager.  Same freq range and and format. Have the appropriate info programed into it and you're done.
--
Trace Carpenter, P.I., TSCM
214.828.4520
214.828.1917 Facsimile
**************************************************************************
10)From: SpyKing@thecodex.com
Subject: New Product Info

I found this and thought it of interest to the list...

>"Sierra Wireless Combines Cellular Data, GPS; MP 200-GPS Modem 
>Provides Both in a Single Package"
>
> The combination MP200-GPS product includes an MP200 rugged CDPD/cellular
> 3-watt mobile modem, a state-of-the-art Trimble GPS receiver module and 
> a choice of magnetic mount or hard mount GPS active antennas. In addition, 
> the MP200-GPS includes an  internal microcontroller, so it can operate 
> without a PC or mobile data  terminal as a standalone tracking monitor. 
> A remote host computer can wirelessly program the unit to report position 
> on a preset timeout,  whenever the unit moves a certain distance, or if 
> an external alarm is triggered.
**************************************************************************

Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 36


******************************************************************************
Vol.Two Issue #36          The Surveillance List           Feb.4,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Media Interview  
02) Re: Fiber Optic Interception 
03) New X-Ray Imager 
04) Re: GPS tracking systems
05) What They Won't Tell You About the New Phones
06) Computer Security Training
07) New Information Source.
08) Re: Pager Interception Techniques  
09) Re: Pager Interception Techniques
10) Re: Pager Clones
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: dbugman@amug.org (tim johnson)
Subject: Media Interview
 
My favorite competitor is seeking information. If you know anyone, please
pass the info on to him ASAP. (Don't you just hate short notice requirments).

Anyhow, Kevin is one of the good guys, so any assistance you can provide
will be appreciated.

Tim
=========================================

Kevin Wrote:

Greetings,

I have been contacted by a network TV news show which is doing a story
on parents using surveillance techniques (electronic and otherwise) to
monitor their children's behavior / misbehavior.

Specifically, they would like to interview several PI / security
consultants who have handled cases like this. Ideally, the clients
should be willing to share their stories too, and both parties should be
in the New York / NJ / CT area if possible.

If you, or someone you know is interested, please contact me via email
by noon 2/4/97.

Kevin D. Murray
mailto:murray@spy.busters.com
==================================

Thanks
Tim Johnson
========================================================
Tim Johnson
Technical Security Consultants Inc.  (602) 786-0909
dbugman@amug.org
http://www.amug.org/~dbugman/
What you say in private is your business. Keeping it private is ours.
(c)TSCI 1987
========================================================
**************************************************************************
2)From: "William Ehrendreich" 
Subject: Re: Fiber Optic Interception  
 
> 
> Well that sounds like fun to me. Let me ask some questions first. 
> 	1) Is there some place where I can have unobserved cable access?
> 	2) How often is link integrity monitored?
> 	3) What is link integrity? (SNR > 65dB, absolute intensity, etc)
> 	4) Cable specs please...
> 	5) frequency of the light
> 

Lets assume.... standard single mode fiber... you choose the dim...
absolute intensity... multiband switch.. randomly spaced smart
repeaters....

> Off the top of my head here's a brief answerlet... I'm assuming the cable
has
> a constant carrier wave and this is always monitored.  A guy paid to
watch
> that the "Carrier Detect" light on the fibre optic transceiver never goes
out.
> If it does push that big red button, or some other 'system'. So even if
there
> is no actual data flowing, there's still a continuous carrier wave...
like a
> modem. The alarm goes if there's a carrier drop for more than .05 sec.
You
> cannot therefore cut, splice and fuse the cable... no time.

There is a time domain based constant carrier. With it you have 200 mil.
seconds maybe.... 

> Here's what we do... fibre optics use total internal reflection (TIR) to
keep
> light inside and just bounce it off the walls. The formula to determine
what
> angle you can put light into the fibre at (cone of acceptance) is 
> angle =90-invsin( n2/n1 ) where n1 and n2 are the indices of refraction
of the
> cladding (outside) and the core (inside) respectively.  This give you an
angle
> with respect to the central axis of the fibre.

YESSSSS WE have the beginnings of a winner. The big thing is that known
angle!

> A light ray impacting on the surface will reflect just like a mirror if
it's
> angle of incidence is less than or equal to that of the cone of
acceptance. if
> it's greater, it just leaks out the sides... But how do we adjust the
angle 
> of incidence, seeing as the target set it up right?  simple... bend the
cable
> light leaks... this is how we intercept the signal.  You don't have TIR
> anymore... IR but it isn't total. Now we strip the jacket off a small
part of
> the cable exposing the fibre.  By now you should have all phoned the
local
> telco and asked them about their fibre optic services... what kind of
cable
> they use.  Then you should have acquired some of this cable from
somewhere.

Not that easy.... may not be telco supplied fiber.... lets say that this is
a very paranoid organization with its own right of way and facilities.

> Lay your fibre next to the one to be monitored. Give it one full wrap
around.
> Hook up your detector to your cable, and bend the two cables together
into a
> loop. By doing this you make it possible for light to hit the wall at
> something less than the critical angle, causing it to refract out. the
paralle
> cable is bent the same way, and the interface order is reversed, so you
now
> have the signal captured... not too much though... more bend means more
> attenuation and that'll get you noticed if you're sloppy. In the last 4
years
> scientific american published an article where something like this was
> mentioned... I'll try get the reference.  If anyone wishes a slightly
more
> mathematical version of this plan, let me know, and I'll send you a
proof.
> 
**************************************************************************
3)From: Steve Schear 
Subject: New X-Ray Imager
 
New X-ray gun trades privacy for safety

Reported by Andy C
Seen in The Nando Times on 13 August 1996
---------------------------------------------------------------------------

The Passive Millimeter Wave Imager can X-ray through clothing to "see" a
concealed weapon, plastic explosives or drugs. A police officer can
surreptitiously aim it into a crowd from as far away as 90 feet.

The new X-ray gun is becoming a symbol for an unlikely alliance of civil
libertarians and gun owners who fear the fight against crime and terrorism
may be waged at the expense of personal freedoms.

"I'm incredibly concerned," said John Henry Hingson, a past president of the
National Association of Criminal Defense Lawyers, meeting here this past
week. "The entire nation could become a victim of illegal searches and
seizures and the law is powerless to protect them from these police abuses."

But in these nervous times following the the crash of TWA Fight 800 and
bombings at the Olympics, Oklahoma City and the World Trade Center, many
Americans are now willing to trade some of their privacy and civil liberties
for greater security.

A poll last week by the Los Angeles Times found that a majority of people --
58 percent -- said they would curtail some civil liberties if it would help
thwart terrorism. Thirteen percent said it would depend on what rights were
at stake. The poll didn't ask people to single out any rights.

The Clinton administration has proposed increased wiretapping and other
anti-terrorism steps, and is doling out research grants for cutting edge
anti-crime technology that once may have been intended for only military
use.

Last year, the National Institute of Justice awarded $2.1 million to three
companies to develop weapon detectors for airports, stores and public
buildings.

Two models are being developed of the Passive Millimeter Wave Imager, a
creation of Hadley, Massachusetts-based Millimetrix Corp.

The larger one, about the size of a shoebox, is mounted on a patrol car and
pointed at the unsuspecting person. The gadget doesn't send out X-rays;
instead, it picks up electromagnetic waves emitted by human flesh.

Anything that stands in the way of those waves -- like a gun -- or anything
that emits weaker waves -- like a bag of cocaine or a plastic explosive --
will show up on a little screen in the patrol car.

Clothes emit no waves. Neither do walls, allowing the device to be used from
even outside a room.

A second model is a smaller, battery-operated version that an officer can
operate by hand, like a radar gun.

Millimetrix hopes to field test the larger model soon at a police agency.

Hingson argues the device runs roughshod over bans against illegal searches
and seizures. The law says police can stop and frisk a person only when an
officer has a "reasonable suspicion" the person is armed or involved in a
crime.

Millimetrix points out that while the imager can see through clothing, it
still leaves people some privacy. The device's display screen, the company
says, "does not reveal intimate anatomical details of the person."

Chip Walker, spokesman for the National Rifle Association, noted that
devices like the imager threaten the legal rights of people in 31 states who
are allowed to carry concealed weapons with proper licenses.

"We certainly support efforts to disarm criminals, but we need to be careful
that we're not painting with too broad a brush here," he said.

Walker said that as troubling as terrorism is, people may be playing into
terrorists' hands by giving up their privacy.

"One of the broader issues is that if we start giving up certain civil
liberties, that essentially means that the terrorists are starting to
accomplish one of their goals," he said.

Contact email address: acobley@mic.dundee.ac.uk

---------------------

(From a TRW development program description)

The Passive Millimeter Wave sensor detects thermal energy, which is
radiated from objects and reflected from other objects such as the sky in
the 94 Giga Hertz frequency band. The advantage of this frequency is that
there is little attenuation of the energy by water particles in the air
(fog).

The camera operates very much like a television camera except that it
operates at mm-wave frequencies (near 90 GHz) instead of in the visible
spectrum. It has components analogous to a television camera: optics to
focus the image, a readout device to convert the electromagnetic energy
into electrical signals, signal processing electronics to prepare the
signals for display, and display unit to view the scene. The optical system
images the blackbody radiation emanating from the scene on the Focal Plane
Array (FPA), which consists of an array of small antennas, each coupled to
a very small MMIC W-band (90 GHz) direct-detection receiver.

----------------

>From a description of the National Law Enforcement & Corrections Technology
Center/Northeast (NLECTC) at Rome Laboratory (more on that later).

The Millimeter Wave Imaging Radar Consortium seeks development of a
suitable technology and effective, affordable products for concealed weapon
detection (CWD) and through-the-wall surveillance (TWS) application ---
well-established objectives for both military operations other than war and
civilian law enforcement agencies. Consortium members include Millimetrix
Corp., South Deerfield, Mass.; Technology Service Corp., Trumbull, Conn.;
and Riverside Research Institute of Lexington, Mass. They will contribute
$2,035,087 to the research program, while the government's share will be
$2,018,491. Military applications of the envisioned technology, in addition
to operations other than war, would include use by military police and
special forces personnel, all weather aircraft operation, shipboard and
airborne missile warning, helicopter obstacle avoidance, battlefield surveillance, fire control, and missile seekers. Civilian law enforcement agencies would be able to use the technology in curtailing terrorist acts and juvenile handgun crimes that frequently involve the use of concealed weapons, bombs and other contraband that cannot be detected using currently available technology

see 
**************************************************************************
4)From: ERIC C HART 
Subject: GPS tracking systems
 
Re: the recent discussion on the above:

 1. Is it possible to install a transmitter in a vehicle
     permanently, that runs off vehicle power, but has
     its own power supply in case the power is cut
     and/or triggers when the alarm is set off ? 
 2. Can this unit be of a size that would permit being
     installed unobtrusively ?
 3. What would the specs be for a unit like this ?

I've seen other systems tried here before, but they never
worked well because of the terrain. This seems to me to
be a better way to provide "location on demand" in case
of an emergency.

Eric Hart  -   intell@coqui.net
**************************************************************************
5)From: Steve Kramer 
Subject: What They Won't Tell You About the New Phones
 
When you bought a 46 49 Mhz phone you didn't think of privacy until
your neighbor repeated something she overheard. (Legally)

So you got a "DIGITAL CODED" phone that did absolutely nothing for your
privacy. It only keeps your neighbor from dialing it.

So you bought a "SPEECH INVERSION Scrambler" and found that Inverted
speech can be decoded by a 4 dollar experimenter's kit.

So you got "900 Megahertz technology" and found that your neighbor's
R-7000 gets 900 Mhz quite well. Ditto for the Speech inversion model.

So you bought a Spread Spectrum phone from Cincinnati Microwave
 ...Smart move....BUT.....You also bought a standard Analog Cell Phone
from (Fill in the blank)______ (Cellular One....Ameritech etc...) And
found your conversation published in the local paper. You finally gave
up on that when your Neighbor mentioned overhearing you on his UHF
Television and/or handheld scanner. Of course this is Illegal but SO
WHAT! It's only illegal if they repeat what they hear.  And get
caught...and get prosecuted.....FAT CHANCE.  The Telephone Lobby spent
ALL of their money ramming the law through congress....You won't
believe what they are lobbying for now!

SO you get the NEW DIGITAL Cellular phone...SMART MOVE! BUT...  You
drove 3/4 mile outside of town and your phone switched to...  OLD STYLE
ANALOG MODE WITHOUT INFORMING YOU AND THAT"S their latest DIRTY LITTLE
SECRET! Good luck Newt!
**************************************************************************
6)From: Ron Lander 
Subject: Computer Security Training

The Computer Security Committee of the American Society for Industrial 
Security (ASIS) is conducting two seminars relating to Computer Security 
between March 17 and March 20, 1997 in the Los Angeles area.

The first session, "Basic Computer Security", will be held on March 17 
and 18. Highlights include Information Classification, Developing 
Policies and Standards, Basic Risk Management, Developing a Security 
Awareness Program, and more.

The second session, "Intermediate Computer Security", will be held on 
March 19 and March 20. The highlights include Assessing I-Net Risks, 
Firewalls and Advanced Security, Internet Crime and the Law, Security and 
Law Enforcement Interfacing, Managing the Virus Threat, and more.

The sessions (individually) are $445 for members and $565 for 
non-members. If you attend BOTH sessions, the cost will be $800 and $1015 
respectively.

The seminars will be held at the Crowne Plaza Redondo Beach & Marina 
Hotel, 300 North Harbor Drive, Redondo, Beach, Ca. 90277.

For further information, contact ASIS Customer Service at 703-522-5800.
You can also contact: http://www.asisonline.org.

For some extra detail and further information, you can also contact me at 
http://www.asisaie.org or E-mail: rlander@ix.netcom.com.

Ron Lander, CPP
California Inland Empire
**************************************************************************
7)From t_robarts@hands-on.ltd.uk Tue Feb  4 07:58:35 1997
Subject: New Information Source

Hi everyone -

"NetSpy: How To Access the Facts and Cover Your Tracks" ... Wolff New Media

A full review of this interesting book can be found in the Newsgroup alt.
security, dated 31 January 1997 12:47.
The author of the review is Michael Crestohl 

Timothy Robarts
t-robarts@hands-on.ltd.uk 
**************************************************************************
8)From: Trace Carpenter 
Subject: Re: Pager Interception Techniques  

The question was:
For instance, let's say I have a target pager number of 666-555-1234, how do I find out what pager company owns it and what frequency to monitor 

Response:

In my area, I can tell most of the companies by the exchange of the telephone number;  however, if you don't have that luxury just pretext it.  Page a number one or two digits  off and when the caller contacts you, act perplexed and say no, I was setting off my new beeper to see if it worked.  Did yours go off too? What company is yours with? etc.

If you don't want to do that, just call a few of the pager companies and tell them you found a beeper in the park.  You don't know whose it is but the phone number is on it. One of the companies will know what company it is by the number.

After you get the company frequency is easy.  Go ck out a pager.  Ask what different bands they are on.  They'll tell you.  VHF, UHF, 900, etc.  
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
9)From: CrACKeD 
Subject: Re: Pager Interception Techniques

> Assuming one is setup to intercept pager traffic and store and monitor
> capcodes, how does one find out what frequency to monitor? There are
> many frequencies. For instance, let's say I have a target pager number
> of 666-555-1234, how do I find out what pager company owns it and what
> frequency to monitor to capture capcode on? Please respond to list as
> this message is from an anonymous remailer. 

Simple, just call the paging company and ask.  Frequencies are public
information, you have every right to know what they are.  If the paging
company you ask is paranoid and refuses to give you their frequencies, and
you lack the resources to fight them legally, just check one of the many
FCC frequency databases out there.  If all else fails, ask me what you're
looking for and I should be able to locate it.

As for finding out what paging company a particular number uses, you can
use several methods.  Either look on the pager itself (not always
possible) or call the number and send a page, as some systems say "Thank
you for using Joe's Paging" when you press the # key to send.  If neither
of these methods work, you could try calling paging companies one by one
and asking what local prefix most of their pagers are assigned to.

CrACKeD 
**************************************************************************
10)From: CrACKeD 
Subject: Re: Pager Clones

> Glad to help on the phone freqs.  I think mine is on 934Mhz.  As for the
> scanner, a different antenna will help, but beware a high gain antenna
> can shorten battrey life. Also, if you have a specific target in mind:-) 
> you can use a directional (yagi) type antenna.  That will allow you to
> only recieve in the direction your pointing.  Reasons for this are
> obvious. 

Trace, perhaps you could elaborate a bit regarding your claim that a high
gain antenna can shorten battery life.  I've been a ham radio operator for
years, have experimented with oodles of antennas and am familiar with
radio theory.  An antenna is nothing but a chunk of iron with no
electrical connection to a radio's power supply.  Now, if you're referring
to some sort of premaplified antenna, then yes, it's going to need its own
source of power.  If you use a preamplifier, the antenna you use has no
effect on the amount of power it draws.

CrACKeD 
**************************************************************************

Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 37

******************************************************************************
Vol.Two Issue #37           The Surveillance List             Feb.5,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) New Surveillace Technology?
02) re: Pager Clones
03) Motorola portable phone  
04) Rocky Mountain or Colorado TSCM tech
05) Phillip peart
06) Pager Decoding Equipment & Software
07) DMV
08) Best way to check out company in UK?
09) Transparent Surveillance Software?
10) Re: Philip R Peart
11) Back Issues of Surveillance List
12) Wanting to be anonymous on the net
13) Outside Surveillance Cameras
14) Re: Pager Interception
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: SpyKing@thecodex.com
Subject: New Surveillance Technology

I found this and thought the list might be interested...

     THE TELL-TALE HEART

     Detector picks up heartbeat of hidden humans

     NASHVILLE, Tennessee (CNN) -- A criminal on the run can cover his
     tracks and stay out of sight, but more and more, his hiding place is
     likely to be given away by his own metabolism. Police use infrared
     sensors that find a suspect by his body heat -- and now there's a
     new kind of detector that gets to the heart of the matter. 

     At Tennessee's Riverbend Maximum Security Institution, officials are
     testing a device that can pick up the vibrations of the human heart.
     The detector could have prevented the only successful inmate escape
     from the facility, which houses some of Tennessee's toughest
     criminals, since it was built in 1989.

     It was a daring breakout -- four prisoners literally drove out the
     front gate.

     Aided by a prison cook, a secret compartment was built into the back
     of a six-wheel truck. The inmates hid behind a wooden panel painted
     like the truck interior.

     As the truck prepared to leave the prison, guards took a quick look
     inside, didn't notice anything unusual and cleared it to pass.
     escaped

     Called the "Enclosed Space Detection System," the new heartbeat
     detector can "hear" the heartbeat of a person hidden inside a car or
     truck. It is also used to detect intruders trying to break into
     classified facilities.

     "It's kind of like a Trojan horse operation, where you had a
     dedicated, small terrorist team inside a vehicle getting into a very
     secure facility," says Leo Labaj of Tennessee's Oak Ridge
     National Laboratory, which developed the system. "This will prevent
     that."

     The heartbeat detector works by using seismic sensors that are
     placed on a vehicle at a checkpoint. The heartbeat actually moves
     the vehicle itself a few millionths of an inch. The sensors detect
     the shockwave generated by a heartbeat, however slight, and computer
     software screens out other signals.

     Results are displayed on a computer screen in the guard house.

     Tennessee's corrections officials are impressed with the system's
     accuracy. screen

     "It's something that I feel if we had in place when we had the
     escape, we might not have had that escape," said Tennessee
     Correction Commissioner Donal Campbell.

     Labaj said that the device was built with "off-the-shelf equipment."

     "What we brought to the table was the algorithms, the
     number-crunching that went into the software to find the heartbeat,"
     he said.

     The first version of the new system to be offered for sale costs
     about $50,000 -- about the yearly pay for three Tennessee
     corrections officers, according to the labor department.
**************************************************************************
2)From: mjones@nbserv2.dseg.ti.com (Marty Jones)
Subject: Re: Pager Clones
 
> > First , thanks  for the info on frequencies for portable phones. I have
> > a hand held PRO - 51
> > from Radio Shack. Is there anything I can do to increase the range of
> > reception, like a magnetic mounted antenna? Or do I need a better
> > scanner ?
> > Also, I wanted to find out how to clone or get a twin pager?  Do you
> > only need the pager # ?
> > Would greately appreciate this info ?
> 
> Glad to help on the phone freqs.  I think mine is on 934Mhz.  As for the
> scanner, a different antenna will help, but beware a high gain antenna can
> shorten battrey life. Also, if you have a specific target in mind:-) you can
> use a directional (yagi) type antenna.  That will allow you to only recieve
> in the direction your pointing.  Reasons for this are obvious.

Hi, I have not posted previously because I am not in the surveillance business,
but, as an RF engineer, I would like to discuss the above statement concerning
high-gain antennas.  Connecting a different antenna will not, in itself, affect
scanner battery consumption at all.  The effect of the higher-gain antenna 
will be to increase the apparent receiver sensitivity, just the same as if you 
moved physically closer to the signal you are trying to hear.  I suppose in some
way this could affect battery life in that the signal may be received
when it otherwise might not, which would change the percentage of time the 
squelch is opened, but the above statement does not refer to this fine point.
Instead it leads the general readership to think that a high-gain antenna 
somehow has a power-consumption effect analogous to installing a higher-wattage 
light bulb.

I enjoy reading this list!

Marty Jones
**************************************************************************
3)From: Ed Beheler 
Subject: Motorola portable phone
 
I have a Motorola America Series model 2185 portable telephone,
(Which encrypts between the handset and the base) and was
wondering if anyone on the list had heard of a way of breaking
the encryption to hear the phone conversation going on?
---------------------------------------------------------------
Ed Beheler / Echo / The Gathering MUD / saturn.netusa1.net 4000
---------------------------------------------------------------
**************************************************************************
4)From: caldwell 
Subject: Rocky Mountain or Colorado TSCM tech
 
I am looking for a TSCM person in Colorado (or Rocky Mountain vacinity)
WITH the appropriate equipment for use on corporate sweeps.  I
previously have flown someone in from the Boston area who always did
extremely professional work for my clients.  The obvious drawback is the
traveling expenses, which were increased because some of the equipment
had to occupy another seat.  (I'm certain several of you have been
there).

I'm a twenty year PI who specializes in corporate work.  I also know
enough to bring in experts when necessary for my clients, since I long
ago recognized my own limitations.  I know that a good tech (like my guy
in Boston) is constantly updating their equipment to meet the needs of
the market, much like I try to keep current on what I do.  

Let me know if there is someone that comes with recommendations.

Thanx
Greg Caldwell, VSM
**************************************************************************
5)From: Elementary Investigations Pty Ltd 
Subject: Phillip peart

regarding your message posted about franchises, your email address is
incorrect. Please contact me directly at lmntry@ozemail.com.au.

Regards
Johan Erlandsson
Elementary Investigations Pty Ltd
728 Parrammatta Rd
Petersham  NSW  2049
0418 975567
**************************************************************************
6)From: SpyKing@thecodex.com
Subject: Pager Decoding Equipment & Software

I found this web site that should be of interest...

RM100 radiopaging decoder

Featured in the current (March 1997) issue of Popular Electronics magazine! 
Decodes POCSAG radio paging transmissions (in combination with a radio scanner or other appropriate receiver).  Small "pod" connects to PC serial port. 
Log messages to disk / forward to another pager / trigger other programs. 
Scan all pages for specific text substrings.  Software support is built into AccuPage (Windows version). We also have a separate decode/display/log program avaliable free of charge.  Build it yourself! Unpopulated circuit boards and full parts kits are available. Or, see the March 1997 issue of Popular Electronics for complete plans. 

See their web site at: http://www.cylexinc.com/ 
I also found this evaluation of the product on a newsgroup...

>I thought this might be of interest, as it was brought up a couple of weeks
>ago. I bought the pager kit and software from Cylex Inc, in  (League City
>Texas), and had a friend of mine who does work for me, put it together. It
>is mighty tiny work and requires a small tipped soldering iron. BUT, It
>worked first time. It cost about $60.00 for the parts kit including case, SW
>and everything
>
>If you're an 'expert' at miniature work, while it is not SMDs (Surface Mount
>Devices), it isn't for a person who mainly uses a 440 Weller :) PLUS some of
>the parts are not clearly marked, so you have to be really careful. There's
>no room for 'desoldering' once a mistake is made.
>
>Since this is the only program I've found that is "TRUE WINDOWS", it might
>be of interest to know it works well. It DOES hog the timesharing, however. :(
>
> It only does POCSAG, but that's almost 90 %  - and the rest is either GOLAY
>or FLEX. The demodulator doesn't want to work with my 'terminal' program,
>but I'm sure I can find out 'why'.  THEIR program is easy to run.
>
>for more info their URL is  "http://www.cylexinc.com"
>
>
> 02/04/97 18:48:59 B=P512 , A=0328798, F=1, msg = 861469576
> 02/04/97 18:49:15 B=P1200, A=0152424, F=1, msg = 595-5260
> 02/04/97 18:49:15 B=P1200, A=0326665, F=1, msg = 6878683911
> 02/04/97 18:49:15 B=P1200, A=1002275, F=1, msg = _MERID_TEST_PAGE 10951 368
> 02/04/97 18:49:22 B=P512 , A=0891384, F=1, msg = 4257121911
> 02/04/97 18:49:22 B=P512 , A=0120801, F=1, msg = 3778895911911
> 02/04/97 18:49:22 B=P512 , A=0114411, F=1, msg = 6
> 02/04/97 18:49:22 B=P512 , A=0331412, F=1, msg = 63624796362479111
>            (this is a sample of what comes out.)
**************************************************************************
7)From: "Samuel A. Graham, Jr." 
Subject: DMV

Okay all you PIs and the like,  I have a very simple question that
someone asked me while they were reading the list over my shoulder.  If
a person has a license plate number (state, etc.)  What would that
person do to find out who the car is registered to?

Come to think of it,  I've wondered about that myself.

Thanks

sgraham@wf.net
**************************************************************************
8)From: Ed Wheeler 
Subject: Best way to check out company in UK?

I have a company in London I would like to check for reputation and business ethnics, what is the best way?  Would appreciate any help.
**************************************************************************
9)From: SpyKing@thecodex.com
Subject: Transparent Surveillance Software?

I found this article and thought it of interest to the list. I also have a question for some of our computer "minds". Could a software package similiar 
to this be written that would act as a keystroke logger and periodically dial 
a target number and upload all information that was "keystroked" on a target computer? The software would have to be transparent of course... Something similiar to the registration wizard in Windows 95. 

>Here is an interesting twist on how some crafty scamsters can
>rack up money on your phone bill
>
>PORNO SURPRISE
>
>Consumers who visited a pornographic website
>(www.sexygirls.com) last month got a big surprise on their
>phone bills. After a few teaser pictures, surfer was told
>he/she needed to download a special program to view the
>archived images. That program was actually a viewer with an
>entire communications suite hidden deep inside (a non-self
>propogating Trojan Horse). The program disconnected user from his/her 
ISPs,shut off the volume on the modem if it was computer controlled,
>and dialed a number in Moldova -- a small, former republic of
>the Soviet Union wedged in between the Ukraine and Romania. All
>the while the consumer was on the website, and even if he/she
>then browsed other sites on the World Wide Web, the Internet
>access was being provided through the Moldova number, resulting
>in huge international phone charges! Consumers didn't know that
>until their phone bills arrived. According to the Toronto Star
>Business Reporter, there are Canadian reports of bills into the
>thousands.
>
>The Toronto star also reports that the Royal Canadian Mounted
>Police has requested all calls from Canada to that number in
>Moldova be blocked. Bell Canada is attempting to provide relief
>for Canadian consumers.
>
>US consumers should contact their long distance providers if
>they find these unexpected charges on their bill.
>
>The RCMP has also required the owners of sexygirls.com to place
>a disclaimer on the site, alerting consumers to the presence of
>the communications software in the viewer. The disclaimer also
>tells consumers how to disconnect if they do not wish to use
>the server in Moldava.
>
**************************************************************************
10)From: Philip R Peart 
Subject: Surveillance List

Dear Sir,

As there has been some misunderstanding with my Email address, I would
like my subscription to the list withdrawn and on Friday February 7, I
will re-subscribe with my new ISP and Email Address.

Kind Regards

Philip Peart
Factfinders@m130.aone.net.au
**************************************************************************
11)From: SpyKing@thecodex.com
Subject: Back Issues

The archive is now 920KB if anyone needs the file...
**************************************************************************
12)From: Trace Carpenter 
Subject: Wanting to be anonymous on the net

The question was posed about how to be anonymous on the net.

Whenever you go anywhere on the net, your provider sends information about your account. If I go somewhere, "trace.onramp.net" gets sent.  That's why if you go to for instance aviation sites all day, and then you go to a search engine, you'll see an advertisment for perhaps a flying magazine.  If I go and I was at adult sites all day I'd see a porn ad.  That's right, they track where you've been!....As I recall cookies.txt is to blame for this.  Anyway, if you want to remain anonymous on your e-mail you can delete the retrun and reply address which will keep if from appearing on the e-mail; or you can replace it with with f-mulder@fbi.gov if you're an X-Files fan, however the regular info is still being transmitted.  If you don't believe it just delete all identifing info
from your option preferences and go to http://pgp.rivertown.net/ and see your account info.

How to get around it.  Remailers and anonymous internet accounts.  You can set one up just like we set up anonymous beepers for undercover cases.  You go in and set up an account with totally bogus information and pay the bill for however long you want  to. We pay ours for a year at a time.  Then just make sure you send them a money order EARLY every due date with the account info on it so you don't get shut off since they cant bill you as they have no address.

Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
13)From: rkinkopf@concentric.net
Subject: Outside Surveillance Cameras

As a paranoid homeowner, I would like to mount a security camera on my
property that would be accessible through the current cable tv system on
an unused channel.

How hard is this to do?

rkinkopf@concentric.net
**************************************************************************
14)From: kevina@citynet.net  
Subject: Re: Pager Interception

hello,
  
i am confused about pager interception, mine is about 158.00 frequency,
it is not a voice pager, how do i convert or tell how it works to intercept
pages? 
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 38


******************************************************************************
Vol.Two Issue #38           The Surveillance List            Feb.6,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Power usage / High gain antennas  
02) Re: Transparent Surveillance Software 
03) TSCM Questions
04) CCTV Cameras
05) Cell phone cloning and remailers....
06) Seeking information
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: Trace Carpenter 
Subject: Power usage / High gain antennas

My apologies to the members of the list.  After recieving a few e-mails I went back and read my posting on antennas.  After reading it twice I realized that I went to lunch between starting the thought and finishing the posting.  A high gain antenna itself will not cause a faster drain of the battery as lets face it; there's no current there. Infact if you check it with a meter, the antenna coil basically shunts to ground, but RF dosen't see it that way.  What I was referring to is a couple of scanners out there, I'm not sure but I think the HX1000 was one that actually had an output jack for a powered antenna which of course would draw current.

There is an exception to this rule however.  I got one response that said a high gain antenna would increase battery life.  Of course that can't be the case anymore than it can decrease battery life except for the following.  If of course due to the larger antenna you're picking up more, then hence the speaker works more.  Nuf said.

Sorry for the brain fart.  Buffers must have been full.
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
2)From: "M. J. Van Ham" 
Subject: Re: Transparent Surveillance Software
 

> I found this article and thought it of interest to the list. I also have a
> question for some of our computer "minds". Could a software package
similiar 
> to this be written that would act as a keystroke logger and periodically
dial 
> a target number and upload all information that was "keystroked" on a target
> computer? The software would have to be transparent of course... Something
> similiar to the registration wizard in Windows 95. 

I know of several keystroke loggers currently in existance (both for DOS
and Windows), all of which are 'transparent' (in DOS, a TSR with an
unassuming name; in windows, a program which simply does not appear on the
tool bar or in the ALT+TAB menu).  Typically these programs simply create a
hidden file somewhere on your hard drive and store the info there.
	
It would be a simple matter for the author of such a program to add some
simple telecommunications support to the program to dial a number every
couple of hours and upload the file.  I imagine an experienced programmer
would have very little difficulty writing a program similar to the one
described (concerning the porn site).
**************************************************************************
3)From: Willie Teasley 
Subject: TSCM Questions
 
Newbie Questions
	
First, thanks to both SpyKing and the members for a very professional
list.  Pardon if I listen way too much, my qualifications could be (at
best) Aprentice Guru Wanna Be in Pre-training.
	
With Oklahoma several years behind trends, it seems TSCM is a good spot
for my loves, abilities, and pocket-book to be.  Enough time to study,
train, practice, and position myself.

Questions:
	
1) Professional Attitude, particularly with equipment .... am I best
saying "I don't want to know" or employing some degree of curiousity to
avoid supplying wanna-be ciminals?

2) ISDN tactics?  I am seeing more ISDN from 2B+D thru multi-PRI.  No one
agrees to signalling, compression, ID's, etc.
	
3) Opinions on the new Cable-Modem systems ... sounds like a hackers
heaven and Telecommuter nightmare.

Teasley
**************************************************************************
4)From: CrACKeD 
Subject: CCTV Cameras

Anyone interested in purchasing a used CCTV camera for about $25 may
contact Bradley Bossert at KBBOSS@worldnet.att.net.  As of about 30
minutes ago, he has 6 left.  I have made a purchase from him with no
problems, although I haven't tested what I received aside from applying
power and noticing a power on LED light up.  These units require 24 VAC
(I'm using 25.2 just fine), have a BNC video out connector, and come with
a lens.  There is also a DIN style IRIS/SYNC plug on the back of the unit. 
Contact Bradley for more specific specs if you're interested.

CrACKeD 
**************************************************************************
5)From: The Cube 
Subject: Cell phone cloning and remailers....

I've been trying to clone an older model Motorola cell phone for a while
now but to no avail.  It's an EE2 and I've already read through the
"Bible" and gotten all of the test mode params from another motorola
like mine.  The most I get is a fast busy signal or the operator telling
me I'm not authorized to use this service.  What am I missing, and how
do I go about getting this info?

also, concerning remailers/anonymous surfing..  where can I
find/download/whatever things of this sort.  I tried anonymizer.com but
that's been giving me a lot of problems lately....

Thanks,
-- 
The Cube
The Computerist's Dreamland	
(not exactly but that's what I choose to call it :-)
"http://www.geocities.com/SiliconValley/Park/5310"
**************************************************************************
6)From: Ben Berrell 
Subject: Seeking information

Hi my name is Ben Berrell and I am currently investigating the possiblity of
opening up a private investigation business in Australia. Could anybody tell
me if they know of any private investigation discussion groups that exist in
Australia. I particularly want to know about the types of personal
information that can be obtained legitimately (e.g. criminal history etc.).
All the best, Ben
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 39


******************************************************************************
Vol.Two Issue #39           The Surveillance List            Feb.9,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Phone call "trace" 
02) RE:Cloning  
03) Re: GPS tracking   
04) ISDN tactics?
05) Searches for free  
06) Re: Transmitters
07) Slain Deputy Photo
08) W&J 8940B RECEIVING SYSTEM
09) Phone Companies to Charge per minute...
10) SFIA Journal Articles
11) Re: Cell phone cloning and remailers....
12) Intelliegent Phone Recievers.
13) Business Card Exchange
14) Investigations In Australia
15) Best Scanner?
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: SueLough@aol.com
Subject: Phone call "trace"

I need to find out if a call was made to phone #1 from phone #2. I have the
date and approximate time as well as both phone #'s.  Would you be able to
point me in the right direction to get this info?  Thank you very much.  Sue
**************************************************************************
2)From: trever.kb9nhu@juno.com (Trever C. Trader) 
Subject: RE:Cloning
 
Well, all that I could say is, that cellular theft is wrong.  This is the
part where I become little miss manners.  Cellular theft has cost me alot
of money, and I don't agree with it.  It can also interfere with the
operation of the switch.  If both phones ring at once, at both answer at
once, then it has been known to shut down a cell system a time or two. 
Anyway, with pager cloning, no one loses money because no one is racking
up a big bill at someone elses expense.  Will cellphone cloning, the
Carrier locally (CellularONE a div. of SBMS) had reported a loss over 4
million due to cloning and other forms of fraud.  All I am saying is, I
would not clone if I were you, plus it is a federal offense.

Sorry if I have upset anyone, and this does not necessarily reflect the
opinions/feelings of all group members.

Trever C. Trader
KB9NHU
2743 S. Veterans Pkwy. #206
Springfield, Illinois 62704-6536
**************************************************************************
3)From: EdShak@aol.com
Subject: Re: GPS tracking 

GPS tracking on the vehicle either "Real Time" or with a memory board is here
and is in use with many Law Enforcement agencies. the price is from $7,000.00
to $12,000.00

Our company sells,trains and supports this equiment.  Feel free to call us
216-356-3730 ask for Joe.
**************************************************************************
4)From: Alan Gatlin 
Subject: Re:  ISDN tactics?  

Regarding Willie Teasley's   question:

2) ISDN tactics?  I am seeing more ISDN from 2B+D thru multi-PRI.  No one
agrees to signalling, compression, ID's, etc.
	
This is the area I work in as Training Manager for Livignston Enterprises,
also where I did consulting work. PRI (Primary Rate Interface ISDN) DOES
have agreement as to standards. There are no SPIDs or DNs. Compression on
ISDN is another matter, though the Internet Engineering Taskforce (IETF) is
in the process of an RFC on this issue. Currently compression is not common
or compatable between vendors, but that should change in the coming months. 

There are several books avaialbe on ISDN and would be happy to give more
information "off-line" to those interested. Other security issues are the
same as with any remote link via public systems, no better or worse, just a
little different signialing method.

Alan Gatlin

gatlina@primenet.com
alan@livingston.com
**************************************************************************
5)From: David Bartels 
Subject: Searches for free  

We are going to be offering a few searches for free on the web to help
people out.  Hopefully if all goes well, we will have ohio marriage records
on our site for free within the second quarter of this year.

www.datafinder.com

Linking you to the information age...
Datalink Technologies & Datafinder.com

Databases - Networks - Business Telephones - Custom Applications
Web Pages - Custom Cgi - Computers - And Much More

www.datafinder.com
**************************************************************************
6)From WWMason@aol.com Fri Feb  7 18:16:26 1997
Subject: Re: Transmitters

Can anyone provide info on how to extend the battery life of a transmitter? 
Xandi Electronics advertises "the smallest crystal controlled FM transmitter
you can buy".  It's powered buy a litium photo battery, and has a range of up
to one mile.  the problem is that the battery life is only 24 hours.  In some
instances it can be most difficult to get the transmitter in place.  Once in
place, 24 hours of transmitting is to short a period of time.  Any ideas on
how to extend the transmit time?
**************************************************************************
7)From: Ron Lander 
Subject: Slain Deputy Photo
 
In the January 6th edition of the Riverside County Press Enterprise a
photograph of one of the slain Riverside County Sheriff's Deputies was
published on the front page of the paper. It was obvious from the photo
that he had been deceased for several hours.

I think this was in extremely poor taste for the Press Enterprise to
publish this photo! I have created a Web Site in support of  a Boycott
against the Riverside County Press Enterprise for publishing the photo.

If you have time please stop by and sign our online petition

http://www.coronaweb.com/boycott

P.S. Pass this message on to a friend
**************************************************************************
8)From: telfordelectronics@telford2.demon.co.uk
Subject: W&J 8940B RECEIVING SYSTEM

WE HAVE ONE AVAILABLE FOR SALE, WOULD YOU BE INTERESTED?
WOULD YOU KNOW OF ANY OTHER COMPANY WHO WOULD BE INTERESTED?

WATKINS & JOHNSON  WJ8940B
**************************************************************************
9)From: Trace Carpenter 
Subject: Phone Companies to Charge per minute...

I'm sure there are going to be numerous postings about this but I wanted to make sure it gets out there.  I recieved this today and wanted to pass it along.  Many may not know it but this is sort of how O.S.H.A. got started.  It was atttached to a bill sure to pass during a holiday vote while most were out.  Don't let this sneak in!

I am writing you this to inform you of a very important matter currently
under review by the FCC. Your local telephone company has filed a proposal
with the FCC to impose per minute charges for your internet service. They
contend that your usage has or will hinder the operation of the telephone
network.

It is my belief that internet usage will diminish if users were required to
pay additional per minute charges. The FCC has created an email box for
your comments, responses must be received by February 13, 1997. Send your
comments to isp@fcc.gov and tell them what you think.

Every phone company is in on this one, and they are trying to sneak it in
just under the wire for litiagation. Let everyone you know here this one.
Get the e-mail address to everyone you can think of.

isp@fcc.gov

Please forward this email to all your friends on the internet so all our
voices may be heard!

Just passing it along...
-- 
Sincerely,

Trace Carpenter

Trace Carpenter Investigations       Professional Private Investigations
660 Amberton Tower                          Suspicions Confirmed
4144 N. Central Expy.                         Problems Solved !
Dallas, Texas 75204                          Free Consultations
214.828.4520
214.828.1917 Facsimile

**************************************************************************
10)From: Gary Cohen 
Subject: SFIA Journal Articles
 
Thanks again to Brian Poirer for that great article that appeared in
February's SFIA Journal. Next Journal comes out soon, and anyone writing an article relevant to Private Investigators is invited to submit it.  Just E-mail it to me with a brief bio.

Gary Cohen   Investigator      
International Investigative Associates
Ft. Lauderdale/Pompano Beach Florida
(954) 726-9685      Pager (954)409-5599
heatgain@igc.net     Member-FALI & SFIA
http://www.geocities.com/WallStreet/5963/
SFIA - http://www.angelfire.com/fl/sfia/
**************************************************************************
11)From: "Kenneth J. Hawley" 
Subject: Re: Cell phone cloning and remailers....
 
Have a look at Joel McNamara's sites:
	http://www.eskimo.com/~joelm/
	http://www.eskimo.com/~joelm/pi.html
These sites will help you with remailers, particularly Joel's Private Idaho
product.  There is also a great deal of information of general interest to
users on this list, e.g. Tempest.

>From: The Cube 
>Subject: Cell phone cloning and remailers....
> also, concerning remailers/anonymous surfing..  where can I
find/download/whatever things of this sort.  I tried anonymizer.com but
that's been giving me a lot of problems lately....
**************************************************************************
12)From ljsaisa@algonet.se  
Subject: Intelliegent Phone Recievers

Reading a R.S.D.F. security report something very suspect crossed my eyes.
A device witch could be installed in a main telephone swich-box, and could
monitor several 100 lines at once. The device could be activated by some pre
programmed words, ie. bomb, ransom or whatever and start recording if the
device intercepted any of the programmed "trigger words".

If anyone know where this monitoring device could be obtained, please drop
me a line!

L.J.Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
13)From: Gary Cohen 
Subject: Business card exchange

A few days ago, I wrote:

I invite all PI's and info brokers to send me their business cards for my
networking file.  Brochures can be included.  I will do the same.

International Investigative Associates
1461 SW 12 Ave.   Suite F
Pompano Beach FL 33069
__________________________
Keep 'em coming!  GREAT response!

Gary Cohen   Investigator      
**************************************************************************
14)From: Elementary Investigations Pty Ltd 
Subject: Investigations In Australia

Ben Barrell recently inquired about Investigators here in Australia.  I
operate a medium sized firm based in Sydney.  I must say that 95% of so
called Investigators in Australia are Insurance Surveillance Operatives and
have no Idea how to handle other assignments.

Information wise....well, we have general skip tracing tools such as
Electoral rolls, various CD ROM packages with address, phone numbers etc..

We recently lost priveliges as far as Motor vehicle registrations and we
have no legal right to any other information held by any other god damn
department !  If you approach the right person on the right day you may be
lucky, and certain other departments will help you if the sun is shinning.

So to answer you question bill, we cannot acess, criminal records, motor
vehicles rego's, SSN, .

I guess it's up to each of us here to develop skills to acquire information
we need in various ways,  I know I have, but I am one of the very few who can.

If you have any direct questions email me direct and Ill answer them as best
as I can.

Regards

Johan Erlandsson
Elementray Investigations Pty Ltd
lmntry@ozemail.com.au 
**************************************************************************
15)From: "Robert " 
Subject: Best Scanner?

Ok I have been reading lurking for jsut about a week. What do you
guys/gals think would be the best scanner to modify to receive pages?

Robert
**************************************************************************

Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 40


******************************************************************************
Vol.Two Issue #40           The Surveillance List           Feb.10,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Extending Battery Life of a Transmitter  
02) Re: Out of State plates  
03) Video Sources  
04) Re: Phone Call Trace
05) Possible Eavesdropping?
06) re: FCC Charges
07) Decoding Touch Tones
08) re: Best Scanner?
09) Telephone recording schematics?
10) laser listening device
11) laser fencing
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: Trace Carpenter 
Subject: Extending Battery Life of a Transmitter

>Once in
>place, 24 hours of transmitting is to short a period of time.  Any ideas on
>how to extend the transmit time?

Unfortunately the options aren't what you're going to want to hear.  Lower the transmit power which reduces the range is one way.  Another is incorporate a timer which would terminate the transmission during un-needed hours.  However, that reduces the concealability of the unit.  Further, if you had room to do that you could probably just add a larger battery or an AC adapter. which would also fix your problem.  
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
2)From: jake01@juno.com (Brent L Sodders)
Subject: Re: Out of State plates

I run them through a police dispatcher. (friend)
Also in Iowa you can go to the Dept. of Transportation and use one of
their (public) computers to run "in state" plates.  What good does that do?  Well you can also search by name, plate, or soc. (d.l.) number.  Just because you are tracking an out of state plate does not mean that same person is not
in your state's system. (considering you can get some sort of I.D. off their out of state registr. to confirm a match. )

I will not argue the legalities, but a buddy at the P.D. will be of most
help.  Second best may be a buddy with a connection at a service office
such as AAA.  
**************************************************************************
3)From: Bob Waller 
Subject: Video Sources

I am looking for sources of equipment and "real world experiences" with
VCR's used for surveillance. Time lapse, pseudo-time lapse, Digital
Video, VHS vs 8mm, loop recording, timed start, remote and alarm event
activation......etc Video cameras, C-mount, pinhole, color and B&W and small video monitors I am also interested in power sources using batteries and Solar that would allow this equipment to be installed in remote wildland areas or
unattended UC vehicles.

Any real world help would be appreciated.

Bob Waller
Orange County Fire Authority
Orange, California
**************************************************************************
4)From: Trace Carpenter 
Subject: Re: Phone Call Trace

>I need to find out if a call was made to phone #1 from phone #2. I have the
>date and approximate time as well as both phone #'s.  Would you be able to
>point me in the right direction to get this info?  Thank you very much.

I'm assuming this was a local dialed call or we wouldn't be having this discussion.   Don't take this as gospil because I don't know this for 100% sure, but as I recall Sue, this can be accomplished by accessing the ADAK tapes.  Alledgedly a copy of local dialed calls does exist on these tapes but you'd have to subpoena the info.  Also from what I was told all tapes are housed at a central office which I was told was in Nevada I think.  Sounds kinda cloak & dagger to me.   Maybe the central office is Area 51.  Sorry couldn't resist.  Anyway this may not help at all, but I thought I'd throw it out there. 
 
Maybe one of the other list members knows more about this.  Another friend at Bell internal security say's it can't be done.  I know better than that.  The fed's do it all the time.
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
5)From: smckwest@pe.net
Subject: Possible Eavesdropping?

I'm new to the list - have been "lurking" for a few weeks - but
really have an interest here. I've had a question on surveillance from a girlfriend.  She lives by herself in the suburbs and has a few strange neighbors.  Anyway, she has excellent hearing, but has been hearing a very high "static" that seems to fill the house at times.  Not everyone seems to be able to hear it, but she does.  This is a rational woman.  She says the intensity varies, and it has her wondering if somebody is trying to monitor her.
        
I would appreciate any ideas to help her.  Are there simple means
of detection or blocking?  Thank-you for your help.  S. McKiernan
**************************************************************************
6)From: Trace Carpenter 
Subject: re: FCC Charges

I've had some inquiries about bill numbers regarding the proposed 
charges by your local phone companies for internet usage.  Sorry folks, 
I forwarded the posting exactly as it came to me.  Unfortunately I don't 
know anything else about it.
-- 
Sincerely,

Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
7)From: Trace Carpenter 
Subject: Decoding Touch Tones

This came in earlier and I thought some others on the list might be interested:

> Isn't it possible to pick up the touch tones over a scanner and record
> them. Then call your pager
> and replay them, letting your pager company
> decode them for you? Doesn''t seem to work.
> Of course, this was just an expermint on my phone!

Yes it is; and obviously as you have seen it will work.  There are also some other things such as VMB's that work even better than your pager.  There are problems with this however.  It doesn't always work.  The main reason for this is that the tone quality isn't always good enough for the pager central.  This often happens if the tape recorder that the tones were recorded on is battery operated.  Remember that touch tones are DTMF, meaning that there are two tones being played at once in harmony.  If the batteries are a little drained then the recorder slows slightly.  We may not be able to hear the difference, but you now have two tones whose frequencies have been altered and are now playing a different harmony.  I've had to simulate drained batteries from my benchtop power supply before to recreate the tones well enough to get them decoded.

-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
8)From: EWW2000@aol.com
Subject: re: Best Scanner?

15)From: "Robert " 
Subject: Best Scanner?

Ok I have been reading lurking for jsut about a week. What do you
guys/gals think would be the best scanner to modify to receive pages?

Robert
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>RESPONSE:
Do it right the first time and purchase an AOR 3000.  It is the most
versatile radio on the market and can be computer controlled.  It cost about
$1100.  from EEB.  Do a www search for EEB&radio and give them a call.  Dont
buy two $500. radios that will be obsolete when you are ready for your next
intercept.  The AOR is a winner.
**************************************************************************
9)From: Ukfan1a@aol.com
Subject: Telephone recording schematics?

I recently got a catalog of phone devices, and one item they had that caught
my eye was a machine to automatically record all incoming & outgoing calls on
a single line. All machines like this costed anywhere from $150-300.

I was wondering if anyone out there had schematics, or knew how to make one
of their own, for less money.  

Thanks for the help.  
**************************************************************************
10)From: TROOPA5@aol.com
Subject: laser listening device

I really need some help, I need to know how to construct a type of device
that when you aim a laser towards a window, you will be able to listen in on
a conversation going on in that room from reflected laser light. But more
importantly I need a way to maybe intercept the laser that someone else is
shinning into my window and prevent them from listening in on my
conversations......I would greatly appreciate any information on this topic
My e~mail address is: TROOPA 5@aol.com

Thanks again  {*_*} 
**************************************************************************
11)From: DHuffa@aol.com
Subject: laser fencing

do you know anything about how laser fencing works? also how you can tell if
its on or not?
**************************************************************************

Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 41


******************************************************************************
Vol.Two Issue #41           The Surveillance List           Feb.12,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) re: surveillance  
02) Re: Phone Trace  
03) RE: Telephone Recording Schematics  
04) Equipment for SALE
05) Re: Phone Call Trace 
06) satellite surveillance
07) Re: Phone Call Trace
08) re: Telephone Recording Schematics
09) Private Investigation/Australia
10) Touch tone decoding
11) re: battery life
12) Laser Response
13) Electronic "spy" toy to build
14) re: Extending Battery Life of a Transmitter
15) SURVEILLANCE BY CAR OR MOTORCYCLE
16) Ideas?
17) Re: Transmitters
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: "Lorenzo Castillo Sanchez" 
Subject: re: surveillance

Laser listeners are a good choice if you can't plant a bug in your
target's room and if u r relatively in a close distance. Say about
100 feet away.  The construction of the device does require knowledge
of putting electronic devices together.  The problem is, though, if 
you are pointing the laser at a slightly bent window(not totally straight that
is), you're gonna get audio problems because the angle at which you point your
laser has to be an equally bisected with the angle the bounced laser beam is
received.  There is a company called  Surveillance Technology Group, but they only seem to supply their high quality laser listeners to law enforcement.  
If you want to know more about laser listeners, get this book - 
"Spook Book II: Forbidden Technology" by Mick Tyner.  You can order 
this book from Paladin Press. They've got a fine collection of books
regarding stuff you'd want to know. Visit the website - 
"http://www.paladin-press.com"   
**************************************************************************
2)From: HtPursuit@aol.com
Subject: Re: Phone Trace

The phone company keeps track of all out-going phone calls by "muds". Ive
been calling them that for so long, I forgot exactly what it stands for. The
other is Tolls, and this is your long distance record. These records will
show you the phone number dialed, the date, time and duration of call. The
phone company usually keeps these records for around 7 years. You can obtain
these legally only with a Subpoena via criminal or civil court, or you can
request your own via the phone company. You can also get them via a good
contact, but they are expensive. They are one of the best investigative tools
for the right case out there.
Hoped that helped.
Bill
**************************************************************************
3)From: "Lorenzo Castillo Sanchez" 
Subject: RE: Telephone Recording Schematics
 
It'd be a better idea if you get a book on that.  I suggest you 
get get this book : "Bench-tested circuits", by Tom Larsen. It's
a pretty new book and is available from Paladin Press 
(http://www.paladin-press.com). The book also covers detection 
circuits that can detect all(?) modulation forms, including the 
digital ones used by the Feds.  I didn't try it out, so I don't know
if it is really effective.  I think I mentioned this company to 
someone on the list who wanted to know about laser listeners.  
    
And, for  those of you who are sorta in the "beginner's level" of 
surveillance and wanna get a general idea about surveillance, 
I suggest you read books written by Lee Lapin (Seen him on TV last 
year ?)  
**************************************************************************
4)From usinet.mattsco@pop03.ca.us.ibm.net  
Subject: (Fwd) Equipment for SALE
Reply-to: investigative_strategies@ibm.net
 
I have an associate PI that is selling some great equipment. Do not 
email me; this is not equipment. Call 503.253.2810 and talk with Peter.
                                                       
-----FOR SALE ---------
AR-3000 A (500khz output)       
Communications Receiver 
Paid $1325  Cash Price $1000

ICOM R71A
100KHZ-30MHZ
Commincation Receiver
TSCM VLF Receiver
Paid $1584 Cash Price $1100

OPTO M1
Pocket Size Frequency Counter
Paid $249 Cash Price $199

OPTO R10FM
Communications Interceptor
Paid $349 Cash Price $249

FM FIlter , Paid $70, Cash $49
800 MHZ Filter, Paid $95 Cash $75

M400 Decoder
FAX, DTMF, Pocsag, Golay Pager Decoding, Ascii, FEC
Paid $449 Cash Price $350

Realistic PRO 46 , 800 MHZ Scanner
Paid $299 Cash $145

TRD-800
RF, Recorder Detector
Paid $650 Cash $500

*****Vehicle Tracking Package**********************
Doppler Receiver 8803 w/ full 360 Readout
Direct Numeric Bearing Readout, Voice Option Installed
ALSO includes
CCR 708A Communications Receiver With Pan Adapter, 800 MHZ
4 Agrello Transmitters
Kenwood 45w UHF Radio -- 16 Channel Programable 
Paid $3400   Cash Price $2400        
 

Call 503-253-2810 .... He will be able to answer all of your questions.. 
**************************************************************************
5)From: R0819@aol.com
Subject: Re: Phone Call Trace 

In a message dated 97-02-11 03:33:23 EST, you write:

<< 4)From: Trace Carpenter 
 Subject: Re: Phone Call Trace
 
 >I need to find out if a call was made to phone #1 from phone #2. I have the
 >date and approximate time as well as both phone #'s.  Would you be able to
 >point me in the right direction to get this info?  Thank you very much.
  >>
Here in Alabama I know that a copy of all incoming and outgoing phone numbers
and call time and duration is kept. As Trace said you have to have a subpoena
to retrieve this info. and it is not something the local telco advertises.
You can call the telco's Subpoena Compliance Office and they should be able
to help you.

Rick Weatherby
Weatherby Investigations
Mobile, Alabama
R0819@aol.com
**************************************************************************
6)From: lisa kirk 
Subject: satellite surveillance
 
Hey  i am an artist that is working on a project to be submitted to a 
major Museum in Los Angeles in the next 2 months.  Basically my 
question is regarding the possibility of aquiring high tech 
surveillance photos that may have been taken via sattelight at a 
conferance that I participated in, in Los Vegas around 4 months ago.  
I am not sure if the possibility of getting such an image is true 
however i have heard that Russia sells these images for roughly 20 
bucks can you help lead me in the right direction?
**************************************************************************
7)From:  (Bret Johnson)
Subject: Re: Phone Call Trace

>I need to find out if a call was made to phone #1 from phone #2. I have 
the
>date and approximate time as well as both phone #'s.  Would you be able to
>point me in the right direction to get this info?  Thank you very much.

I am told by my folks who maintain my local telephone switching network 
that this information might be available from your local Telephone Company 
in response to a nicely worded request IF one of the numbers involved was 
billed to you personally. Otherwise, I am told, there is "a whole lot of 
red tape to wade through".

- johnsonb@laugate1.lau.aetc.af.mil
**************************************************************************
8)From: Trace Carpenter 
Subject: re: Telephone Recording Schematics

>I recently got a catalog of phone devices, and one item they had that caught
>my eye was a machine to automatically record all incoming & outgoing calls on
>a single line. All machines like this costed anywhere from $150-300.
>
>I was wondering if anyone out there had schematics, or knew how to make one
>of their own, for less money.

The devices you are referring to can be obtained or built cheaper; it just depends on what all you want it to do.  I'll be glad to explain how to make the long play circuts & trip switches if you want to make them or you can use other over the counter type items:

If you want to purchase the equipment, you can take an ordinary tape recorder and place a trip switch on it as long as it has a remote jack on the side.  Switches of this type are available from Radio Shack, BUT BEWARE of quality.  They don't cause clarity problems but do to the low resistance in the coil they are very apparent in a TSCM sweep.  You could also use a VOX recorder which would start and stop when sound was detected.  To do this you could take a normal micro recorder if you have one with VOX and use a simple circut I posted a while back.  It uses a single capacitor and a 1:1 transformer and costs about $3 to  build.

If you want to make a trip switch you can build one cheaply out of a relay and the same circut for the vox system.  

If you want the tape recorder to be of a long play variety, you can modify a $24 GE tape recorder from K-Mart with just a couple of diodes, and a resistor to where it will give you about 6 hours of record time per side.  It's not the best sounding lp I've built but they work well if you want to get out cheap.

Let me know which route you want to go and I'll either try to explain it to you or maybe make a *.gif file of a schematic to e-mail to you.
-- 
Trace Carpenter,P.I.
214.828.4520
214.828.1917 Facsimile
**************************************************************************
9)From: Ben Berrell 
Subject: Private Investigation/Australia

Hi my name is Ben Berrell. Would anybody know of any suitable books or
literature that deals with private investigation in Australia. Although
there is an abundance of literature relating to the American environment I
am unable to find any suitable literature. All the best Ben
**************************************************************************
10)From: Elementary Investigations Pty Ltd 
Subject: Touch tone decoding

We use a computer program to decode DTMF tones. We simply capture the signal
via signal in on the sound board and the computer does the rest.

Believe it or not, it even works when there is interference on the tape.  Of
course there is no reason for any of us to have recorded a telephone
conversation in the first place, so this is merely an experiment.  If any
one wishes to conduct the same experiments please contact me direct and Ill
send you the software.

PS. You will need a good quality sound card !

Regards

Johan Erlandsson
Elementary Investigations Pty Ltd
lmntry@ozemail.com.au
**************************************************************************
11)From:  (Bret Johnson)
Subject:  re: battery life

I may be able to help you with your battery life problem -- but one word of 
caution: It ain't going to be real simple or easy.  The problem is that 
battery (storage capacity) technology just hasn't been able to keep up with 
the rest of the electronics field, as far as miniaturization goes.  
Currently, lithium batteries offer the longest shelf life (and I think 
useage life) of all batteries.  I'll have to do some research to verify 
that before carving it in stone.

Although I am not intimately familiar with Xandi transmitters, we may be 
able to figure out a way to lower the power consumption (and increase 
operating time) at the expense of range.  Remember, there is no such thing 
as a free lunch!  Also keep in mind that a manufacturer's claim of range is 
usually based on a totally flat line-of-sight environment with no 
obstructions to block or weaken the signal -- something very hard to 
duplicate in the REAL world.

Another option available, if physical size is not a great consideration, is 
to use a larger battery. Not a higher voltage battery -- but one with more 
Ampere Hours (current) available.  An example of doing this would be to use 
"D Cell" batteries with that little Walkman headset radio instead of the 
traditional "AA" batteries.  Both batteries provide approximately 1.5 volts 
each (3 volts when connected in their series configuration), but the "D" 
cells have a higher amp/hour rating and will extend operating time by a 
factor of at least 4.

A third option would be to hard-wire the thing (semi-permanently) into the 
mark's electrical system (with the appropriate power conditioning device, 
of course) and let the mark foot the electrical bill.  Not knowing your 
particular circumstances involved in the operation, I can't say what would 
be best.  That is for you to decide.

If I can assist you further, please let me know.

johnsonb@laugate1.lau.aetc.af.mil
**************************************************************************
12)From: Trace Carpenter 
Subject: Laser Response

>I really need some help, I need to know how to construct a type of device
>that when you aim a laser towards a window, you will be able to listen in on
>a conversation going on in that room from reflected laser light. But more
>importantly I need a way to maybe intercept the laser that someone else is
>shinning into my window and prevent them from listening in on my
>conversations.

If you have little knowledge about this you might want to start with the kit from Information Unlimited.  It's not a great device but it will get you started in the right direction.  There are several problems you need to be aware of however.  First and formost is Title 18 USC.  READ IT!  Whatever your need is probably isn't worth being in front of a federal judge.  Next, the kits you're going to find read the reflected beam not the retro-reflection. The difference is that while a beam reflects at the same angle from the window that your laser is positioned toward it.  You then have to capture the reflected beam.  Your major  problem there is if you were  pointing the laser at a second story window, imagine where the reflected  beam is...three stories up.

I can give you a supplier for the commercial type which uses an infrared beam and reads the retro-reflection from 1 mile away, but they're about $40K and you'd have to have it shipped outside the U.S.  Like I said Title 18.

As for defeating the laser on your own window; there are devices to help do that.  Just remember it's reading the resonance of the glass.  You can counteract that.  

What makes you think you're being listened to via laser?
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
13)From: Chris Kuethe 
Subject: Electronic "spy" toy to build
 
Someone was asking about digital voice changers. I had two references. I found
them:
Radio Electronics (Electronics Now)  Sept. 1992
Radio Electronics (Electronics Now)  Jan.  1993

Someone else was wondering about laser listeners.... I built one. detecting
them is *really* easy.  Glass is green, lasers are red or invisible (unless
soneone paid _way_ too much)  Look at the window.  See if there's any red
scatter in the middle, and look on the walls, etc. for red dots.  If you don't
see anything, turn out all the lights, and scan the window with a video
camera.  You will be able to see the laser scatter from an invisible IR laser.
If you can't see the IR that way, then it isn't there.  Otherwise your window
would crack/ explode from overheating.  To beat the listener, turn up yous
stereo pretty loud and put it by the window.  Tune it most of the way to an FM
station, but make it so there's a lot of static.  Or talk in the bathroom with
the water and shower going.  White noise. (All you "Bug-savvy" types - am I
out to lunch here?)  Hides your voice.  and talk real quiet.  the less intense
the is signal the better your chances of hiding it.  More info (including
construction theory) can be found in _THE_LASER_COOKBOOK_  by Gordon McComb,
publ. 1988 TAB BOOKS.  Wonderful reference.

PLUR
chris

--
Chris Kuethe  LPGV Electronics and Controls
   'finger -l ckuethe@gpu.srv.ualberta.ca' for pgp keys
         http://www.ualberta.ca/~ckuethe/
RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/          
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>   
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d01)From: Trace Carpenter 
>Subject: Extending Battery Life of a Transmitter
>
>>Once in
>>place, 24 hours of transmitting is to short a period of time.  Any ideas on
>>how to extend the transmit time?
>
>Unfortunately the options aren't what you're going to want to hear.  Lower
>the transmit power which reduces the range is one way.  Another is
>incorporate a timer which would terminate the transmission during un-needed
>hours.  However, that reduces the concealability of the unit.  Further, if
>you had room to do that you could probably just add a larger battery or an
>AC adapter. which would also fix your problem.
 
This is just too good to pass up,

Yes, use bigger batteries (lithium ion), radically decrease the power
output, use a wideband FM or spread spectrum modulation.

 ===============================================================
 "If it doesn't involve a torque wrench, then it's not TEMPEST"
 ===============================================================
  James M. Atkinson
  Granite Island Group - TSCM.COM
  127 Eastern Avenue #291                 http://www.tscm.com/
  Gloucester, MA 01931-8008                  jmatk@tscm.com
 ===============================================================
      The First, The Largest, The Most Popular, and the Most
      Complete TSCM Counterintelligence Site on the Internet
 ===============================================================
**************************************************************************
15)From: gary.smith@wmcmail.wmc.ac.uk
Subject: SURVEILLANCE BY CAR OR MOTORCYCLE
     
I would like to hear from people who are "up to speed" about any new 
methods or know the "old" methods of keeping a close tail on a target
**************************************************************************
16)From: lee 
Subject: Ideas?

I would like to monitor and record a conversation from a distance, known
only to one of the two parties and with no complicity whatsoever on the
part of my man.

Distance: 10-15 meters, across a busy street.

Interference: Heavy midday traffic (London).

Talk volume: 3-4 (Whisper = 1, normal = 5)

Background & parameters: 
Nothing criminal, just personal.
No complicity on the part of my man, whose only participation is
to talk the other party into confessing to a particularly indiscretion.
This rules out a body wire, taking the dog for a walk (with a radio
transmitter on the underside of its collar), placing a shotgun mike in a
parked car (parking problems among others, such as uncertain timing or
location), or 'steering' the venue to a location where a fixed setup
could be waiting. 

Budget: +- 2,000 UKP, from scratch. 
Directional microphones: This seems to be the simplest overall solution,
but I believe the current crop are not very good, as they tend to pick
up too much background noises. 

Please post, or email ideas, thoughts or advice to:
lee@infoplus.demon.co.uk.
**************************************************************************
17)From: mjones@nbserv2.dseg.ti.com (Marty Jones)
Subject: Re: Transmitters

 **************************************************************************
> 6)From WWMason@aol.com Fri Feb  7 18:16:26 1997
> Subject: Re: Transmitters
> 
> Can anyone provide info on how to extend the battery life of a transmitter? 
> Xandi Electronics advertises "the smallest crystal controlled FM transmitter
> you can buy".  It's powered buy a litium photo battery, and has a range of up
> to one mile.  the problem is that the battery life is only 24 hours.  In some
> instances it can be most difficult to get the transmitter in place.  Once in
> place, 24 hours of transmitting is to short a period of time.  Any ideas on
> how to extend the transmit time?

Actually modifying the transmitter circuit to reduce current consumption 
is probably beyond most experimenters.  Anyway, if the design is efficient,
the modification would be accompanied by a reduction in output power and 
effective range.  What you can do, though, is add more battery capacity.  
Just use a larger battery of the same voltage.  Obviously there will be a 
size/weight increase with the larger battery, but there's no free lunch. 
Another option, which may or may not work in your situation, would to make
the transmitter voice-activated so that it is not "on" 100% of the time.  In 
intermittent use, a 24-hour "talk" time could stretch for weeks.  If voice-
activiation is not an option, you might also consider picking up local power
where the transmitter is to be installed.  For example, hide it behind a 
switchplate and rectify/regulate the wall power to keep a battery charged.
You can also rectify and use a small amount of power from a phone line.  
Marty Jones
mjones@nbserv2.dseg.ti.com
**************************************************************************

Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 42


******************************************************************************
Vol.Two Issue #42          The Surveillance List            Feb.13,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Re: MUDS & LUDS  
02) Intro - Isreal    
03) Equipment Acquisition  
04) Re: Possible Eavesdropping
05) Privacy for windows
06) spying on a web browser
07) Update on "Your Signature for Sale?"
08) Re: trojan horse program 
09) Searching Hard Drives
10) Transmitter power saver
11) re: SURVEILLANCE BY CAR OR MOTORCYCLE  
12) syringe implantable biochip
13) Phone System Hacking
14) Adaptive Networks Audio Bug
15) Re: Ideas?
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: caldwell 
Subject: Re: MUDS & LUDS
 
Metro Useage Dialing and Local Useage Dialing.
**************************************************************************
2)From: "hotam" 
Subject: Intro - Isreal  
 
27A Keren Kayemet L'Yisrael
Givatayim, Israel 53225
Tel.972.3.6729958    
Fax.972.3.672.2234       
E-MAIL: HOTAM@INTER.NET.IL                                                      http://www.hotam-il.co.il
Hotam - Investigations & security, Inc
Narkunski gideon 
**************************************************************************
3)From: "Muhammed F. Karatash" 
Subject: Equipment Acquisition

I am interested in the acquisition of listening equipment.  The equipment
is for use outside the U.S.  It will need to do the following:

Equipment 1:
to transmit conversation on a phone line to a reciever in the area,
preferably as far as possible.  To then record this information only when
something is being said.  

Equipment 2: 
To do the same as equipment 1, except instead of the phone, it should
capture the conversation in the room.  Device has to be as small as
possible.  Should need only intermittent servicing.

For both apparatus the transmissions should be coded, and should only be
recievable by the dedicated recievers.  I would appreciate it if someone
could point me to where I can obtain these from.   I am also searching for
laser sights for guns and rifles.

email: mkaratash@wesleyan.edu
**************************************************************************
4)From: Al Thompson 
Subject: Re: Possible Eavesdropping
 
> 5)From: smckwest@pe.net
> Subject: Possible Eavesdropping?
> 
> I'm new to the list - have been "lurking" for a few weeks - but
> really have an interest here. I've had a question on surveillance from a
> girlfriend.  She lives by herself in the suburbs and has a few strange
> neighbors.  Anyway, she has excellent hearing, but has been hearing a very
> high "static" that seems to fill the house at times.  Not everyone seems to
> be able to hear it, but she does.  This is a rational woman.  She says the
> intensity varies, and it has her wondering if somebody is trying to monitor her.
>         
> I would appreciate any ideas to help her.  Are there simple means
> of detection or blocking?  Thank-you for your help.  S. McKiernan
  
Well, first I would find out if there is any relationship to her hearing 
this and other things in her life.  For instance, what is her 
work-related noise exposure?  Does she listen to music?  What kind?  How 
loud?  Does this happen after exposure to any of this?  It could be 
temporary threshold shift or tinitus.  It could even be related to blood 
sugar, or alcohol, which both affect the hearing mechanism.
 
To detect it, use some a good quality microphone, and a high quality tape 
recorder and record various places in her house when she says she hears 
it.  You can them play back the tape over a high quality system or 
with real good headphones, amplify it, and try various EQ settings to see 
if there's really anything there.  Did I stress "high quality" enough?  
You aren't going to do much with a $79 boom box.
 
If you pick up something, then you can determine what it is.  With 
various placements of the microphone, you can probably figure out where 
it's coming from.

If you don't pick up anything, you might also find out if there's any
high-voltage power lines nearby - which can induce voltage in some
people's tooth fillings.  The same could probably hold true if a
neahighbor is a HAM radio operator
**************************************************************************
5)From: "Donald J. Zaroda" 
Subject: Privacy for windows
 
Can you point me toward some material, like an adhesive film or insert
which, when in place on an auto or building window would offer visual
privacy, yet still amidt lots of light for making video recordings?  Typical
"tints" available at audio stores, etc. just darken the window, and
sacrifice available light indide.  Even metallic films I've seen admit just
40% of the light.  Not good for nighttime documentation. 
**************************************************************************
6)From: dedhedred@iquest.net
Subject: "spying" on a web browser
 
Is there a way for me to view what exactly is on my home computer screen 
from a computer at work. 

To be more clear, I would like to remotely (without my wife knowing) see the same web or chat pages that are being viewed in my house, at the same time from my computer at work. I have asked alot of people, they all say that it can be done but they don't know how.  It is my own personal computer, so I could load or configure anything I want.  But I don't even have a clue as to where to start. 
 
Any information that you could give me would be greatly appreciated.
**************************************************************************
7)From: SpyKing@thecodex.com
Subject: Update on "Your Signature for Sale?"

An update I found on the previous post...

>Greetings.  Since the recent distribution of my "Your Signature for Sale?"
>piece recently, I've received a great number of responses and personal
>anecdotes.  For right now, there are two points I'd like to pass along.
>
>First, some persons making inquiries to UPS have apparently been told that
>the UPS signature display software doesn't allow printing out of the
>recipient's signature.  Outside of the fact that conventional Windows
>functions, drivers, and "background" programs can be used to capture and
>print the contents of virtually any Windows application's screens, it seems
>to clearly be the case that the UPS software itself does include a signature
>print function.  By the way, I'd like to thank the person who faxed me a
>copy of the full UPS ad (from "The Economist", and subsequently seen in
>other publications) which promotes that signature printing function twice in
>the ad text plus again with a picture of a printer...
>
>Second, as I had suggested would probably be the case, some persons have
>indeed reported problems getting their UPS delivery persons to accept an "X"
>or similar "non-signature" to receive their packages, even though such
>actions were explicitly suggested to me by UPS management.  If your local
>UPS driver refuses to turn over a package under these circumstances, you
>should insist on the issue being immediately escalated to a supervisor and
>if necessary to management at UPS headquarters in Atlanta.  At a certain
>level up the chain of command you should be able to find someone who will
>verify that such non-signatures *are* acceptable on the automated signature
>pads.
>
>More on this developing story to come...
**************************************************************************
8)From: "Gerald Hagerty" 
Subject: Re: trojan horse program 

I need some help in the form of info.
Is anyone familiar with the trojan horse program being sent via e-mail,
they market themselves a LIVE SEX VIdeos, XXX Naked WOMEN, and the like,
they send you a few pictures but in the process upload a tojan horse that
gives them access to your phone lines resulting in mega phone bills for
you. I understand at least one of the programs originated from Croatia or
Moldavia. I had compiled a significant amount of reseach on these worms for
a news release but you guessed it, when I dumped AOL as my IP I lost the
files. Any help would be appreciated. Please send to
ILQQK4DOE@worldnet.att.net    Credit will be given where due.    Thanks. G
**************************************************************************
9)From: HtPursuit@aol.com
Subject: Searching Hard Drives

This is the new generation of investigative tools. I need some information on
what type of program is needed and the basic how to do on recover E-mail from
a larger main frame computer for a company. This is out of my league but at
least I can answer a few questions and help a client. The company has a main
frame CPU, I beleive IBM, and there are aprox. 30 work stations. There is a
Email program and there are some individuals that have used it and the
company wants to retreive the deleted Email. I have been trying to learn this
area, but need some help. Thanks in advance......
**************************************************************************
10)From: RetSheriff@aol.com
Subject: Transmitter power saver

To the list, 
You cannot modify a transmitter to reduce power draw. Ohm's law dictates that
the loss in power "in" will be a loss in power "out", hence less transmission
distance. It goes without saying that choosing the most efficient circuit is
tantamount. Even so there is a small device I've seen used that definately
increases battery life by 100% depending on use requirements. A photo
transistor in the power path will not allow the battery current to flow to
the transmitter unless there is light in the room. Daytime or nights when
someone is in the room is a good bet that is the only time it needs to be in
service. Some obvious drawbacks are the device must be in a place that
recieves some reflected light. Another is the knee curve of the transistor or
it's bias becomes critical. If it doesn't turn on hard it could seriously
limit the current to the device in a poor light situation.

Good Luck!

Jim Marino

J. MARINO ASSOCIATES
Private Investigators
203 MAIN STREET SUITE 245
FLEMINGTON, NJ 08822
Call toll free  (800) 600-9551, or e-mail RetSheriff@aol.com

Serving Private Citizens, Corporations, Law Firms, & Government 
Civil Matters, Major Crimes, Trial Prep, Fraud, Loss, Missing Persons,
Background Checks  - Find us on the WEB in the Codex Mall: 
http://www.the codex.com/mall/jmarino.html
**************************************************************************
11)From: principal@connect.ab.ca
Subject: re: SURVEILLANCE BY CAR OR MOTORCYCLE  
 
>15)From: gary.smith@wmcmail.wmc.ac.uk
>Subject: SURVEILLANCE BY CAR OR MOTORCYCLE
     
>I would like to hear from people who are "up to speed" about any new 
>methods or know the "old" methods of keeping a close tail on a target

I have used a motorcycle to tail Subjects numerous times and with varying
degrees of success.  If you want to "keep a close tail".  The use of a
motorcycle is a tremendous asset.  The benefits as I have experienced are;
· they are highly maneuverable good in alleys and less likely to get trapped
in heavy traffic,
· less suspect,
· most non motorcycle enthusiasts can't tell one motorcycle from another
especially from the rear view mirror,

There are some serious drawbacks as well, some of which are;
· It is practically impossible to make any kind of notes while tailing and
any photographic or video efforts are out of the question.
· When the Subject stops for a short period of time you are likely to be
left sitting on your bike and a bit exposed.

To avoid these drawbacks I employ a motorcycle and a car or van.  The
motorcycle keeps the majority of  mobile visual contact with the Subject
while the car hangs back.  The rider uses  a two way radio with an
earphone/mic and relays the location of the Subject and activities.  Should
the Subject stop, say at a convenience store, the rider informs the car.
The car takes up post, shooting video, making notes etc., when the Subject
moves the car informs the rider and he picks up the Subject a short time
after he departs.  I have found this to be the most effective way to
capitalize on the advantages of the motorcycle.  

I am not sure what your definition of close surveillance is but the way I do
things close surveillance means that loosing the Subject is not acceptable
therefore you should consider using a team, min. 3 vehicles, comms, and 2
pers per car.  It is impossible to conduct one man close surveillance for
any period of time with out getting burned.  If your Subject isn't wary at
first, he soon will be, and them your degree of  difficulty increases
dramatically. 
**************************************************************************
12)From: Good News Magazine 
Subject: syringe implantable biochip

I am a reporter looking for information on the implantable human
biochip. I need any resource information you can provide.
Thanks
Kathryn
Good News Magazine

Phone 520-790-2440 
email: feedback@goodnewsmag.com
----------------------------------------------------------------------------
Good News Magazine
A Different Look at Issues Affecting Your Family
Good News Communications, Tucson, AZ
http://www.goodnewsmag.com
----------------------------------------------------------------------------
**************************************************************************
13)From: rkdixon@esper.com
Subject: Phone System Hacking

Anyone familiar with the AT&T Merlin Legend phone system?  Are there any
specific or general vulnerabilities to hacking from the outside?  Any
special precautions which will help protect the system?
**************************************************************************
14)From: jmatk@tscm.com (James M. Atkinson, Comm-Eng)
Subject: Adaptive Networks Audio Bug

As promised,

Here is my analysis of the Spread Spectrum Threat poised by some of the new
spread spectrum power line circuits.

I was asked build a demonstration device that would intercept audio and
transmit digitally via the AC mains to a monitoring station located off
site.

The purpose of this devices was strictly for threat assessment purposes,
and for academic study.

Specifically, I was asked to build a wireless microphone that would tranmit
digitized audio via spread spectrum modulation into the power lines.

Used the AN1000CS chip set from:

        Adaptive Networks, Inc.
        1505 Commonwealth Ave.
        Brighton, MA  02135
        (617) 497-5150

Simple 64 kbps codec on the microphone, dumped the resulting data stream
into the little 45$ chip set.

The entire circuit from microphone, to AC plug cost just under $145 US.

If the entire circuit is reduced to SMT we can easily obtain a package
under 2.25 cubic centimeters (30 * 15 * 5mm). Goal is to conceal circuit
INSIDE a wall outlet or light switch without exterior mods to plastic
casing.

The raw tranmit data rate is 268 kbits/sec (well below the 450 khz
authorized by the FCC). Actual intell data stream is 56 bits/sec, payload,
the balance is overhead.

Able to run four devices on a single AC circuit with no interference problems.

Unit tested (in the field) worked flawlessly in an office building after
dry transformers were bridged.

I will be playing with a store and foward version with a compander circuit
and will advise progress.

Entire circuit expoxied into GE wall switches (2ea), and into GE wall
sockets (2ea).

Power draw currently below 25ma of AC power, should have it below 15ma shortly.

-jma

 ===============================================================
 "If it doesn't involve a torque wrench, then it's not TEMPEST"
 ===============================================================
  James M. Atkinson                       Phone: (508) 546-3803
  Granite Island Group - TSCM.COM
  127 Eastern Avenue #291                 http://www.tscm.com/
  Gloucester, MA 01931-8008                  jmatk@tscm.com
 ===============================================================
      The First, The Largest, The Most Popular, and the Most
      Complete TSCM Counterintelligence Site on the Internet
 ===============================================================
**************************************************************************
15)From: Someone.else...@m3.pcix.com
Subject: Re: Ideas?
 
Just use a wireless mike system.  You can pick up the Trensmitter and 
the base receiver at Radio Shack for about 150 bucks.
									-->Casey
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 43


******************************************************************************
Vol.Two Issue #43           The Surveillance List           Feb.15,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) "spying" on a web browser  
02) Comment    
03) Software programs 
04) Cell Phones
05) Link Exchange?
06) Can my employer spy on me?
07) Background check
08) re: syringe implantable biochip
09) Re: "spying" on a web browser 
10) re: Surveillance Vans
11) room bugging w/long-range transmitters  
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: "M. J. Van Ham" 
Subject: "spying" on a web browser

> To be more clear, I would like to remotely (without my wife knowing) see the
> same web or chat pages that are being viewed in my house, at the same time
> from my computer at work. I have asked alot of people, they all say that it

Well, there are couple of problems with doing that.  First of all, if you
want for your wife to be able to connect to the internet, and for you to
watch remotely, you would need two phone lines and two modems setup in your
computer.(one for her to connect to the 'net, and one for you to dial in on).

The other problem is getting software that will allow you to view what is
happening on the screen at home.  I know there are several software
packages out there to do just that (i.e. pcAnywhere, laplink, etc.), but
they are hardly transparent (meaning that your wife could see the program
running, and close it).  I'm not familar with any programs that are
transparent and allow you to dial in and view the users screen.

There is one thing I could recommend to you though.  If all you want to do
is check up on which web pages your wife has been visiting, you can get a
cache browser for Netscape or Internet Explorer (which ever browser you
use).  A cache browser allows you to view all the pages in Netscape or IE's
cache.  So, as long as your wife doesn't empty the cache everytime she
quits Netscape or IE, you'll be able to see what pages she has been
visiting.  The only problem with this is that you won't be able to see what
your wife is doing as it happens.  You'll have to wait until you get home,
and then run this utility.

You can get a copy of Netscape or IE cache explorer from the following
address:
http://ourworld.compuserve.com/homepages/M_Wolf/

Hope this has been of some help.
**************************************************************************
2)From: JoeSleuth@aol.com
Subject: Comment  

noticed a reply from jim marino he sounds like he knows what he is talking
about
**************************************************************************
3)From: Ben Berrell 
Subject: Software programs

Hi my name is Ben Berrell and I am in the process of setting up a private
investigation agency in Australia. I am seeking information as to software
programs that will assist me in case management (Windows '95 compatible). If
anybody has any advice or suggestions please let  me know. All the best Ben
**************************************************************************
4)From: SpyKing@thecodex.com 
Subject: Cell Phones
 
I found this on The New American web page...

GRU Snooping Continues. The interception, taping, and publication of a
conference call between Newt Gingrich and other congressional leaders
demonstrates the susceptibility of microwave-transmitted electronic
communications to eavesdropping. A growing number of intracity phone calls,
e-mail, and faxes, as well as nearly all long-distance calls, are carried via
microwave. But it's not just itinerant Democratic Party activists with police
scanners who can listen in on microwave communications.

As the Center for Security Policy (CSP) points out, the GRU _ the Main
Intelligence Directorate of the General Staff of the Russian Armed Forces _
maintains signals intelligence ("sigint") facilities in Lourdes, Cuba, and
Cam Ranh Bay in Vietnam which are capable of intercepting nearly all microwaved
communication across the continental United States as well as the Atlantic and
Pacific. Furthermore, according to the CSP, "it is believed that both the
Russians and the Cubans are developing capabilities at Lourdes to conduct information warfare (IW). Such a capability would permit these facilities to be employed not only to intercept information [but also to] make it possible for Moscow or Havana to manipulate telecommunicated information so as to deny the American people and their government vital services or otherwise work against U.S. interests."

According to former GRU Colonel Stanislav Lunev, "The strategic significance of
the Lourdes facility has grown dramatically since the secret order from Russian
Federation President [Boris Yeltsin] of 7 February 1996 demanding that the
Russian intelligence community step up the theft of American and other Western
economic and trade secrets. It currently represents a very formidable and
ominous threat to U.S. national security as well as the American economy and
infrastructure."

Yet the Clinton Administration insists that it is in America's interest to
allow the GRU to continue its eavesdropping on the U.S. In congressional testimony delivered on March 16, 1995, Assistant Secretary of State for Inter-American Affairs Alexander Watson asserted that pressuring Russia to discontinue sigint activities in Cuba "could limit our ability to promote reform and stability in Russia" as it could "be seen by the Russians as interfering with the exercise of their right under the START Treaty to monitor compliance with the agreement...."

As with so many other issues, the Clintonites and the Soviets are reading
from the same page regarding the Cuban sigint facility. Izvestia reported last
November 30th that the U.S. "does not object in principle to the continuing existence of the electronic center in Cuba...."
**************************************************************************
5)From: ljsaisa@algonet.se
Subject: Link Exchange?

Is there anyone else in the security / surveillance business who would
appriciate a "community link exchange program"?? For those who might be
interested, visit < http://www.algonet.se/~ljsaisa/linkdir/exchange.htm >
(the bill board page) for a taste of how the future bill board will look at
I.S.A. For those who wants a display add on our bill board... IT'S TOTALY
FREE!!! Just sign up! The only chriteria is that you have a security /
surveillance company, or a company relatated to the business. (No personal
service adds accepted) Even if you're not interested... take a peek, you
might get temted! It dosn't cost you a dime, just 5 minutes of your time!
Form for signing up on the site!
Any questions, mail me at: < ljsaisa@algonet.se >

Sincerely;
L. J. Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
6)To: spyking@thecodex.com
Subject: How much can my employer spy on me when I use my internet service provider?

Can my employer, with the help of the internet service provider that I
use, find out were I go on the net.  Could they somehow log all my email
messages and the News Groups and URL's that I access?  If so, is there
any way that I can block them?

Thanks for any help that you can give me.
**************************************************************************
7)From: SueLough@aol.com
Subject: Background check

How would I go about "digging up dirt" on a person I am having legal problems
with? She is a bit of a mental case with quite a sordid past and I'm sure it would damage her credibility if I could provide some facts rather than just
hearsay. Could you help point me in the right direction?  

A damsel in distress,

Sue
**************************************************************************
8)From: jmatk@tscm.com (James M. Atkinson, Comm-Eng)
Subject: syringe implantable biochip

12)From: Good News Magazine 
Subject: syringe implantable biochip

I am a reporter looking for information on the implantable human
biochip. I need any resource information you can provide.
Thanks
Kathryn
Good News Magazine

Phone 520-790-2440
email: feedback@goodnewsmag.com
----------------------------------------------------------------------------

The majority of the devices to which you refer require an outside source of
energy (typically a RF or Magnetic field).

Normally the act a resonant frequency devices, reflecting or multipling a
burst of signal.

-jma

 ===============================================================
 "If it doesn't involve a torque wrench, then it's not TEMPEST"
 ===============================================================
  James M. Atkinson                       Phone: (508) 546-3803
  Granite Island Group - TSCM.COM
  127 Eastern Avenue #291                 http://www.tscm.com/
  Gloucester, MA 01931-8008                  jmatk@tscm.com
 ===============================================================
      The First, The Largest, The Most Popular, and the Most
      Complete TSCM Counterintelligence Site on the Internet
 ===============================================================
**************************************************************************
9)From: "Dominic Palombo" 
Subject: Re: "spying" on a web browser 

> Subject: "spying" on a web browser
> 
> Is there a way for me to view what exactly is on my home computer screen 
> from a computer at work. 

Aside from checking the web browser cache files...you can 
install "Look@Me"

Check out:

http://www.farallon.com/www/look/download.html

     [ Dominic Palombo :::::::::::::::
.....[ dmpalomb@ief.iconcrossroads.org

____________________].random.quote.of.the.day.[____________________

Dare to keep the CIA off Drugs.
**************************************************************************
10)From: SpyKing@thecodex.com
Subject: re: Surveillance Vans

A while back there was someone interested in outfitting a surveillance van. Checkout this website for some ideas: http://mall.lnd.com/vhf/survell.htm
**************************************************************************
11)From: The Cube 
Subject: room bugging w/long-range transmitters

what's the longest distance that one can transmit audio from a bugged
room, and how would I be able to make/buy one?  Also, one more thing,
does anyone have a faq or something on pager cloning?  A friend of mine
and I need multiple beepers and decided to save some $$ in our business
and just one one service with multiple pagers.

Thanks,
-- 
					    The Cube
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 44

******************************************************************************
Vol.Two Issue #44         The Surveillance List             Feb.16,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) re: computer surveillance   
02) Signature Digitizer  
03) Spying on a web browser  
04) Spy satellite photos by (E)-mail order
05) Investigative degree  
06) I'm really afraid that...
07) Intro - Australia
08) Mods?
  
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: "Steven R. Price" 
Subject: re: computer surveillance  

-----BEGIN PGP SIGNED MESSAGE-----

A question regarding observing the computer output while away from home...
could one not set up a video-capture board in the computer and connect it to a
VCR forthe output to be reviewed at a later time?
[Concerning vol.1,issue#43question 01]

Regards;
       SRP
-----BEGIN PGP SIGNATURE-----
Version: 4.5

iQCVAgUBMwef2gCgfJf0svDjAQHf9QP8DqbdmYpw8cg1MeJOXEKKQMXviQV5GNFB
7v/Oyy0wSOTO1A5nAJqu80PVGdhTnkUpY1XaQpNOetdHxpbiWxYphKWWXrOytZTY
IyKiJEYZ3a4NPBXpuWC51QqC37G8dOTghs1TD7OWtcRgDrvTYIfv9cCysLO9IBUd
6RozDrv1muo=
=8vf2
-----END PGP SIGNATURE-----
**************************************************************************
2)From: maywood@juno.com (Betty Maywood)
Subject: Signature Digitizer 
 
In follow-up to the UPS signature issue, our UPS driver was one of the
first in NYC to have the signature tablets on his route.  I have been
printing my name on this tablet ever since without problem.  At times
when our regular driver was out (vacation, etc.)  I've never experienced
problems with his relief driver(s).  I second the motion that those who
experience resistance from their UPS driver take it up the
chain-of-command to UPS headquarters (Stamford, CT???), if necessary.

I also suggest those who are interested in this issue to check out the
postings on the Usenet group alt.privacy.

Keep up the great list.
------------------------------
Betty Maywood
maywood@juno.com
------------------------------
**************************************************************************
3)From: "Stephen Douglas" 
Subject: Spying on a web browser
 
Dear M.J.,
If you are that worried about your wife's fidelity, I would recommend 
the two of you get into a counseling program. A lack of trust like 
this usually stems from one of two things; 1)Your own infidelity or 
2) She has given you reason to distrust her. In either case a 
counseling program is in order. If you love her and want to keep her, 
it will be worth it.
Best of luck,
Stephen Douglas K6HZT
http://www.dfsystems.com
**************************************************************************
4)From t_robarts@hands-on.ltd.uk Mon Feb 17 07:57:50 1997
Subject:  Spy satellite photos by (E)-mail order

Hi everyone - I thought that this would be of interest to one and all of my
fellow List members.

With enough encouragement from other List Members - email queries to my
address below, please - I would be prepared to research this facility more
fully and file a report to the List in due course.

From "The Sunday Times"; 16th.February 1997 ; Page 5.

"SNOOPERS TO GET EYE IN THE SKY" 		

CONSUMER AFFAIRS CORRESPONDENT.

Spy satellites, once the exclusive preserve of the security services, are to
be made available to anybody with a credit card.

For a few hundred pounds, it will soon be possible to see into the gardens
of superstars, snoop on terrorist training camps in Libya or monitor a
spouse on a business trip to Amsterdam.

The first of a series of commercial spy satellites is to be launched by
EarthWatch, an American space technology company, in April, prompting
predictions of a revolution in snooping.

John Murtagh, a specialist in remote imaging at the National Remote Sensing
Centre, Farnborough, Hampshire, said "You are never going to know if you are
being photographed. They are about 700 km. up".

Orbiting the Earth on a north-south axis once every 90 minutes, the new
"eyes in the sky" are equipped with cameras developed by military
intelligence during the cold war and capable of picking out objects within
one square metre.

To order a photograph, customers need only telephone or email the company,
giving a map reference and credit card number. The instructions are passed
to the satellite, which takes the pictures within three days and beams them
back within hours.

Roger Higginson, a civil servant from the Department of Trade and Industry
who is working with the British space company Matra Marconi to assess the
commercial feasibility of launching a British satellite, believes the new
technology will prove valuable to a wide range of people. The satellites
could enable :

>>> Trawler fleets to order pictures which show where plankton, the tiny
organisms which fish feed on, are gathered.

>>> Commodity brokers who gamble on the future price of crops such as coffee
and sugar to see how crops growing on the other side of the world are
progressing.

>>> The Inland Revenue to spy on farmers suspected of hiring out their
fields to generate undeclared earnings.

>>> Insurance companies to pinpoint houses on low-lying land which is at
risk of flooding, so increasing premiums.

Gilbert Rye, of Orbimage, an American company, said "Someone who is looking
for a house in another town or country will be able to "visit" that place
without going there."

Some, though, are worried. John Wadham, director of Liberty, a civil rights
organisation, said : "In the absence of a law of privacy there is nothing
people can do to protect themselves from this sort of surveillance."  

Timothy Robarts
t_robarts@hands-on.ltd.uk

**************************************************************************
5)From: JoeSleuth@aol.com
Subject: Investigative degree  

anyone interested in earning an associate in specialized technology degree
in private investigations,  write lion investigation academy 434 clearfeild
st bethlehem pa 18017 , this degree is earned entirely at home  school is
licensed  by the state board of private licensed schools pennsylvania
department of education,  other courses available, bloodstain pattern
interpretitation, document examination,polygraph theory,and three stages of
security programs  the latter are diploma programs school established  1974
fax 610 868 4503   610 865 0402  owned and directed by joe alercia private
detective lic pa nj ny dc ne 
**************************************************************************
6)From: "David S. Loader" 
Subject: I'm really afraid that...

...someone is tapping the line using *-# type of wiretapping.
My lawyer says it doesn't exist.I have tried it on a friends
line(immediately emailing him about it)and it does work.
How do you protect against those type of "Buggers".
Pls Re;email me if you have anything to report on how to stop the
people.How do you reset the link on telephne systems.
Dave
**************************************************************************
7)From: Philip Peart 
Subject: Intro - Australia

Greetings !!

We have now finalised our ISP.

Fact Finders Australia are specialists in all manner of personal injury
surveillance.  We are developing a franchise system in Australia with a
network of agencies throughout the country.   Our totally professional
service is now available to all clients and if we can be of assistance,
particularly in Queensland, please do not hesitate to give us a call.

Our Web page will be online soon.

Kind Regards
Philip Peart
Fact Finders Australia
PO Box 74 Bucasia
North Queensland 4750
Australia
Tel: (int) 61 79 549 355
Fax: (int) 61 79 549 455
**************************************************************************
8)From: kevina@citynet.net
Subject: Mods?
 
hello,
i have a uniden 800 mhz portable scanner, can this scaner be modifyed to pick 
up the 800 band? it wont scan certain ereas and it wont accept some frquencys.
if you can tweak this scanner e mail me asap! it is a model BC80XLT.
                                   thanks, kevin
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue $# 45


******************************************************************************
Vol.Two Issue #45           The Surveillance List          Feb.18,1997        
                        Over 1300 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) 3 questions?  
02) Re: Capture cards  
03) Keyboard Intercepts  
04) RE: Mods
05) re: computer snooping
06) RE: Employer Spying
07) RE: Searching Hard Drives
08) Cordless Freqs.
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: pilgrim 
Subject: 3 questions?
 
I have 3 questions:
1 - how to supress the recipient list for email - like you do on the
Surveillance List Forum - I have a need to do this and don't know how. I
am using both Netscape Nav. 3.0, and occasionally the compuserve program
- WinCim, but when I send mail everyone's address is on the top of each
piece of mail. How do you supress this list to guard the privacy of the
individuals on your list?

2. Can anyone help me find a device, I believe it is ultrasonic, that
activates hidden microphones and causes them to "chirp" so they can be
located when sweeping a room?  I have read about it but can't find it.

3. Where can I obtain a tension gauge - which is a locksmith's tension
wrench with a gauge on it that measures torque, to teach apprentices the
right touch in manipulating locks.  It exists, and is used, but I can't
find where to obtain one - so how about some help?

Thanks in advance

+++Moderator's Note+++
Re: List suppression question... I simply send the list bcc: (blind carbon copy) 
through Eudora Pro E-mail software... You can download a trail copy at: http://www.eudora.com
**************************************************************************
2)From: Willie Teasley 
Subject: Re: Capture cards

Alas, computer video never hits the motherboard as "video" but a binary
path.  Video capture cards are built to convert an outside video source
into a data string for direct or overlay remapping.

If the subject has limited computer knowledge, most every movement can be
noted.  in Windows 95, enable "log modem" for dial-up ... this gives times
and dates of connections.  Within the mailer, make sure the "trash" is not
emptied thus allowing recieved e-mail to be monitored 9looking in Sent
folders allows outbound to be read).  I saw CHAT mentioned ... the most
popular IRC chat programs allow logging of conversations, both public nd
private.  The "PIRCH" IRC client is fun and powerful enough to be
attractive while the scripting allows numerous background functions
including searches for anyone the program sees.
	
Just checking and learning each program inside & out can usually provide
an insite to what I would consider "security weakness'."

>1)From: "Steven R. Price" 
>Subject: re: computer surveillance  
>
>-----BEGIN PGP SIGNED MESSAGE-----
>
>A question regarding observing the computer output while away from home...
>could one not set up a video-capture board in the computer and connect it
to a
>VCR forthe output to be reviewed at a later time?
>[Concerning vol.1,issue#43question 01]
>
>Regards;
**************************************************************************
3)From: remailer@remailer.nl.com (Anonymous)
Subject: Keyboard Intercepts

What is involved in intercepting/decoding keyboard signals on a PC? I know of the protocol used for keyboard>>pc data transfer, and feel it would be simple (although time-consuming) to construct a special-purpose xmitter to do the job and find it odd that these devices are not commonly advertised together with their audio counterparts. Are they not needed? Is is a simple matter of "tuning in" to the subject keyboard clock? If so, what is the likely range of such a technique and what is required as far as equipment? Any personal experiences in this area?
**************************************************************************
4)From: Willie Teasley 
Subject: RE: Mods (captioned below)
	
Suggest you use your Web Search power to look for Ham Radio "mod servers"
which will almost surely contain info on how to modify your scanner.
	
If you can, try to get at least a No-Code Tech.  No one EVER suspects a
geeky ham carrying a dual band talkie ... even if it has been modified to
hear other frequencies (as the mod servers will remind you, altho you could
mod to xmit out of HAM bands, it could be illegal).

Teasley (N1WFA)

>8)From: kevina@citynet.net
>Subject: Mods?
> 
>hello,
>i have a uniden 800 mhz portable scanner, can this scaner be modifyed to
pick 
>up the 800 band? it wont scan certain ereas and it wont accept some
frquencys.
>if you can tweak this scanner e mail me asap! it is a model BC80XLT.
>                                   thanks, kevin
**************************************************************************
5)From: Al Thompson 
Subject: re: computer snooping

> 1)From: "Steven R. Price" 
> Subject: re: computer surveillance  
> 
> A question regarding observing the computer output while away from home...
> could one not set up a video-capture board in the computer and connect it to a
> VCR forthe output to be reviewed at a later time?
> [Concerning vol.1,issue#43question 01]

Most capture boards that I know of take their input from an NTSC input 
source, but this does raise another possibility.  The computer video card 
may have an NTSC or composite video output.  If not, split the signal 
going to the monitor and put it through an NTSC converter, and send that 
to a VCR input.
**************************************************************************
6)From: Willie Teasley 
Subject: RE: Employer Spying (captioned below)
	
Preventing an employer from watching your Internet activities is often a
matter of discovering first what protections he has.  Our local "firewall"
plays havoc with efforts to hide as it records all traffic as origination
and destinaltion.  In a loage agancy, such as mine, the quickest is to
locate an unused machine name 9engineer off for the day, system in for
repair) and "steal" their machine ID (modify NET.BAT, TCP.CFG, etc).  This
way, the firewall thinks you are elsewhere.  Recall, if they ever get wise,
you will have left cache files, program fragments, etc. on your machine so
it could get ugly!
	
Without a firewall, locate a local service provider with "telnet" access
.. after subscribing, simply telnet to that system and work from there.
The only trace will be to a local ISP, telnet will mask most or (if done
right) all calls past that point and your employer can not touch the local
ISP without a court order (which is why many delete logs after 24 hours or
less).

Teasley

>6)To: spyking@thecodex.com
>Subject: How much can my employer spy on me when I use my internet service
>provider?
>
>Can my employer, with the help of the internet service provider that I
>use, find out were I go on the net.  Could they somehow log all my email
>messages and the News Groups and URL's that I access?  If so, is there
>any way that I can block them?
>
>Thanks for any help that you can give me.
**************************************************************************
7)From: Willie Teasley 
Subject: RE: Searching Hard Drives
	
If you are speaking of the 9000 series (MVS) mainframes, your job is
nearly done for you.  All regions are incremented and held to be dumped to
tape.  Simply ask your operator to load a "test" region and begin
requesting history.  Your local GURU can point you to the "Book Manager"
that explains these things 9often, they even offer to print a copy for your
book-shelf).
	
Lacking a history, recall you can only un-delete a fragment that has not
had anything new written upon it.  Assuming the RAID was removed as you
should have recomended or that they chose a Writable TAPE/ROM assembly, go
to the SYSVIO assembler.  Map the drive looking for ASCII remnants.  Under
most traditional E-Mail, you can look for the Z that symbolizes end of
letter (file) then browse back up to 130 characters for anything recognizable.
	
If your company has hooked to a local interface (such as LOTUS-NOTES),
grab up a copy of Norton's Disk Editor and Undelete, go to each station and
poke about the local drive.  LOTUS and other similar systems leave huge
garbage files under the Microsoft theory that it is easier to buy more
drives than write tight code.  While you are at each station, poke abot for
unlabeled or oddly labeled diskettes, bootlegged (or legit) back-up
hardware/software which could reveal these very same files.  I like to
carry a lap top around for reading these ... anything interesting is copied
for later research and inclusion in my report to superiors.

	Hope that gets you started!		Teasley

>9)From: HtPursuit@aol.com
>Subject: Searching Hard Drives
>
>This is the new generation of investigative tools. I need some information on
>what type of program is needed and the basic how to do on recover E-mail from
>a larger main frame computer for a company. This is out of my league but at
>least I can answer a few questions and help a client. The company has a main
>frame CPU, I beleive IBM, and there are aprox. 30 work stations. There is a
>Email program and there are some individuals that have used it and the
>company wants to retreive the deleted Email. I have been trying to learn this
>area, but need some help. Thanks in advance......
**************************************************************************
8)From: SpyKing@thecodex.com
Subject: Cordless Freqs.

900 mhz cordless phones:
------------------------
      Base     Handset                    Base     Handset
01)  902.100   926.100              31)  903.000   927.000
02)  902.130   926.130              32)  903.030   927.030
03)  902.160   926.160              33)  903.060   927.060
04)  902.190   926.190              34)  903.090   927.090
05)  902.220   926.220              35)  903.120   927.120
06)  902.250   926.250              36)  903.150   927.150
07)  902.280   926.280              37)  903.180   927.180
08)  902.310   926.310              38)  903.210   927.210
09)  902.340   926.340              39)  903.240   927.240
10)  902.370   926.370              40)  903.270   927.270
11)  902.400   926.400              41)  903.300   927.300
12)  902.430   926.430              42)  903.330   927.330
13)  902.460   926.460              43)  903.360   927.360
14)  902.490   926.490              44)  903.390   927.390
15)  902.520   926.520              45)  903.420   927.420
16)  902.550   926.550              46)  903.450   927.450
17)  902.580   926.580              47)  903.480   927.480
18)  902.610   926.610              48)  903.510   927.510
19)  902.640   926.640              49)  903.540   927.540
20)  902.670   926.670              50)  903.570   927.570
21)  902.700   926.700              51)  903.600   927.600
22)  902.730   926.730              52)  903.630   927.630
23)  902.760   926.760              53)  903.660   927.660
24)  902.790   926.790              54)  903.690   927.690
25)  902.820   926.820              55)  903.720   927.720
26)  902.850   926.850              56)  903.750   927.750
27)  902.880   926.880              57)  903.780   927.780
28)  902.910   926.910              58)  903.810   927.810
29)  902.940   926.940              59)  903.840   927.840
30)  902.970   926.970              ---  -------   -------

Cordless phones:
----------------
    base   handset                base  handset
 1) 46.61 / 49.67             6) 46.77 / 49.83
 2) 46.83 / 49.845            7) 46.83 / 49.89
 3) 46.67 / 49.86             8) 46.87 / 49.93
 4) 46.71 / 49.77             9) 46.93 / 49.99
 5) 46.73 / 49.875           10) 46.97 / 49.97

New cordless phones:
--------------------
    base  handset        base  handset        base  handset
 1) 43.72  48.76      6) 43.96  49.09     11) 44.32  49.28
 2) 43.74  48.84      7) 44.12  49.10     12) 44.36  49.36
 3) 43.82  48.86      8) 44.16  49.16     13) 44.40  49.40
 4) 43.84  48.92      9) 44.18  49.20     14) 44.46  49.46
 5) 43.92  49.02     10) 44.20  49.24     15) 44.48  49.50

V-Link  (Toy Cell Phones)  (WFM)
--------------------------------
916.8750   Calling Channel 1 (Main/Home Frequency)
915.8625   Calling Channel 2
915.0000   Calling Channel 3
914.0875   Calling Channel 4
913.3375   Calling Channel 5
912.0000   Calling Channel 6
910.9125   Calling Channel 7
910.2375   Calling Channel 8
909.3375   Calling Channel 9
908.5000   Calling Channel 10
907.6625   Calling Channel 11
907.0000   Calling Channel 12
906.3375   Calling Channel 13
905.6625   Calling Channel 14
904.5000   Calling Channel 15
904.0000   Calling Channel 16
903.4875   Calling Channel 17
903.0000   Calling Channel 18
902.5000   Calling Channel 19
**************************************************************************
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol @ IsSue # 46


******************************************************************************
Vol.Two Issue #46           The Surveillance List           Feb.19,1997        
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Vehicle alert  
02) Tracking Device? 
03) help  
04) Washington Post Article on Scanner Listeners
05) Invitation to International Security Agency.
06) CMOS Passwords
07) Scanner Modifications
08) Looking for a single enclosure...
09) Tracking Equipment
10) Need contact
11) EMP Generators
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: jeff davis 
Subject: vehicle alert

Hi,
I am interesting in buying a special little device for added security in
my vehicle and would like to know if you have such a device, suggestions
for such a thing or can make it. What I want is to install a electronic
device that will tell me if my vehicle has is moving. For example, the
device would send out an electronic signal if one the car door was
opened or the engine was started or something, something that tells me
that my vehicle is in danger, or to that effect. it would simple light
up a little light or buzz or something on a handheld unit. It has to
have about a 5 mile range, mininum, so if i'm at the mall or something I
would get the signal. Its got to be something cheap, easy to install,
and reliable, it also has to run on a car battery. And not so obvious
that a burglar would notice. A second option, would be to have it setup
to discharge an electronic current to blow the fusses in the car to keep
the vehicle from being stolen. 

Thanks,
Jeff
**************************************************************************
2)From: n2roses@catalinas.net
Subject: Tracking Device?

I have a 14yr daughter.  I want information on tracking 
device to help me locate her when she decides to split.  
I work long hours and have 6 children.  My 14 yr is putting 
my patience to the test.  If I know where she hangs out, 
I can know if she is in trouble or causing trouble.  We 
live in a one square mile town, on Catalina Island.  She
can't go too far... but where does she go?

I hope this does not seem like a stupid request, I am quite
serious.

Thank you, sincerely.    A trying-to-be-a-good parent.
**************************************************************************
3)From: Rose Lewis 
Subject: help

could you direct me to someone who can get into a cable company's
computer and make it look like the bill is paid??

+++Moderator's Note+++

I can't wait to hear the responses to this one...
**************************************************************************
4)From: SpyKing@thecodex.com
Subject: Washington Post Article on Scanner Listeners

Scan You Dig It?
By Craig Stoltz

If you thought America Online chat rooms were a shameful waste of human
potential, just think about the folks who monitor the public airwaves with
radio spectrum scanners. There may be as many as 20 million of them in the
U.S.--more than say, regularly navigate the World Wide Web.

Take, for instance, that Florida couple, the Martins, who (somehow!)
intercepted and (somehow!) tape recorded a revealing cellular phone
conversation among Newt Gingrich and fellow Republicans, Others will divine
whether the Martins were lucky hobbyists or party stooges. But I'm curious
about people like the Martins, folks who apparently choose to entertain
themselves by listening to the hellscratch of human voice bouncing across
the radio spectrum.

According to Bob Grove, publisher of Monitoring Times magazine and source of
the 10-to-20-million-scanner estimate, "In some parts of the country, like
around here [mountainous Brasstown, NC], it's hard to find a household that
doesn't have at least one scanner, maybe two or three."

Unfortunately, a firmer number proves harder to lock onto than a Gingrich
411 call. Neither Uniden, the biggest U.S. scanner supplier, nor Radio
Shack, the largest retailer, reveal sales figures. An industry insider,
declining to cite a source, says 1 million scanners were sold in 1995. Norm
Schrein, president of the 12,000 member National Bearcat Radio Club, cites
an early 80s estimate placing a scanner in 7 percent of U.S. households;
applying that figure to today's population assumes 8 million scanners.
Grove's company maintains a national mailing list of 100,000 scanner
enthusiasts.

The better question is why anybody uses one. Schrein says 90 percent of
first-timers use a scanner to monitor "their neighborhoods--police and fire,
taxicabs, utility companies" and so on. (See Radio Shack catalog pitch at
left). We're talking a very high noise-to-signal ratio here, with many
transmissions of numbing mundanity. "Most people say they learn things they
can't get anywhere else, like where burglaries are, where drug traffic  is,
that sort of thing."

Around 10 percent of entry level users become true scanner enthusiasts,
Shrein says, upgrading to more powerful devices, trading lists of
frequencies (hospital, aviation, military and business codes appear in
books, magazines and on the internet) and, sometimes, graduating to the
shady art of picking up cellular calls. Since 1994 it's been illegal to make
or sell scanners that can, or can be easily modified to, pick up calls on
869-894 MHz sliver of the radio spectrum where cellular calls ride. But used
pre-'94 models are always for sale, and some full-spectrum units arrive from
overseas. Several businesses, including one run by Grove, will perform a
"full-frequency restore" to newer units for a fee. But, in fact, most new
scanners pick up cell phone calls anyway due to technical factors Tandy
Corp. calls "transmission phenomena." In other words, if you want to listen
to cell calls, it's easy. Any if you don't, you'll probably hear some anyway.

Schrein, who lives near Wright-Patterson Air Force Base outside Dayton,
Ohio, says he's picked up some interesting stuff from the legit frequencies.
When the Bosnian peace accords took place in Dayton, Schrein was able to
monitor base security frequencies to learn that Serb leader Slobodan
Milosevic "was going into town to buy shoes." Of course, such memorable
highlights come at a price of constant monitoring of daily false fire
alarms, utility truck maneuverings and god knows how many
honey-will-you-bring-home-a-loaf-of-bread cell calls.

"Actually, I'm getting a little tired of it," Schrein confesses. "You can
get kind of burned out."
**************************************************************************
5)From: ljsaisa@algonet.se
Subject: Invitation to International Security Agency.

International Security Agency now introducing the "I.S.A. Security Link
Exchange".

Are you interested in joining an exclusive security / surveillance community
link exchange program? The goal is to make all members accessible to a
larger group of clients.

Visit < http://www.algonet.se/~ljsaisa/linkdir/exchange.htm > to find out
what it is. For those who wants to participate in this program.  Just sign
up! Joining instructions and application form are available on the I.S.A.
web-site. IT'S TOTALY FREE!! The bill board will be updated with new members
once every week now in the begining.

The "I.S.A. Security Link Exchange Program" is an exclusive, non profitable
service to the members. On display: Your logo (50x50 pixels), Company/Org.
name, and a short company profile with a hyperlink back to your web-site.  

Our ambition is, as this new service grows on Internet, to have a large
selection of security / surveillance firms accessible on a easy to grasp
list with a short profile. This will make it easy for a potential client to
find what he/she is looking for, and make the potential contact accessible
for a larger selection of clients. 

Even if you're not interested... take a peek, you might get temted! It
dosn't cost you a dime, just 5 minutes of your time! Form for signing up on
the site!

Any questions, mail me at: < ljsaisa@algonet.se >

Sincerely yours;
I.S.A.
L. J. Strand
MD

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
6)From: "Michael K. Brady 1-904-546-5925" 
Subject: CMOS Passwords

Well, I did it.  And surely I'm not the only one out here who has!  Will 
anyone else admit that they put a password on their CMOS setup  then forgot 
it?  I did!  For shame!  I could insist that the old password won't work 
anymore, but no one will buy that.
	But what can I do about it?  I need to sell the system so that I 
can upgrade, and I odn't feel right about selling it and not telling about 
the password problem.  What if the buyer wants to upgrade and can't because 
he (and I) don't have the password?  
	Is there anyone who can help?  I need to get around the CMOS 
password.  I have a Cardinal SB386SX Motherboard using American Megatrends 
Inc. I have already tried "AMI" and that didn't work.  I tried to pull the 
battery out, but I couldn't budge it.  (I'm not even 100 percent sure I was 
pulling the right thing.)  Certainly there is some savvy hacker jout there 
who knows a way around the CMOS password.

Thanks,
Mike Brady
bradym@mail.firn.edu
**************************************************************************
7)From trever.kb9nhu@juno.com (Trever C. Trader) 
Subject: Scanner Modifications
   
If anyone needs modifications for scanners, e-mail me... I have a
database of around 100 or so... 
I also have mods for ham radios, shortwave radios, and so fourth.

Trever C. Trader
KB9NHU
2743 S. Veterans Pkwy. #206
Springfield, Illinois 62704-6536
**************************************************************************
8)From: arc333@webtv.net (Alan Corin)
Subject: Looking for a single enclosure...

which contains a low power FM transmitter and a digital tape unit that is capable of continually playing a message over and over. the player recorder could also be analog with a loop tape. the transmitter similiar  to the low power wireless michrophones that broascast on the FM band. If you can bjild 
this can you quote a price for a prototype. THanks' Alan Corin. I forgot it 
must also run on AC.
**************************************************************************
9)From: "Dan Seiler" 
Subject: Tracking Equipment
 
Does anyone have good used tracking equipment for sale?  If so please
contact me at cops@fred.net.  

Dan Seiler
Cops, Inc.
cops@fred.net
http://www.fred.net/cops/
**************************************************************************
10)From: LIAM 
Subject: Need contact

I have been a lurking member for over two months now, congratulations on 
your invaluable service. I am an Investigator in Norway, and i am very 
interested in aquiring contacts on purchasing laser eavesdropping 
equipment, can any one help?
-- 
- LIAM
**************************************************************************
11)From: jaross@notes.primeco.com
Subject: EMP Generators

I am looking for information and products dealing with Electromagnetic
Pulse Wave Generators. EMP generators capable of disabling electronic
devices up to a maxium of 50 yards. If you have any info regarding this
please forward to jaross@primeco.com.
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 47


******************************************************************************
Vol.Two Issue #47          The Surveillance List            Feb.20,1997        
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Thank you 
02) RFI and computers  
03) Microphone identification?  
04) Does anybody know.....?
05) It might be of interest 
06) re: Russian Spy Satellite pictures
07) Telephone FAQ
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: "L. J. Strand" 
Subject: Thank you

I just personaly wanted to thank those who joined the "Security Link
Exchange Program"! 

Thank you!
L. J. Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
2)From:  "Michael Bacon" 
Subject: RFI and computers
 
Your recent article on cell'phones prompts  me to make the following comments drawn from some 30 years of dealing with  computer and communications (now 'information') security.

1. As anyone who uses a cellular telephone knows - the airways are jammed.  
The volume of radio frequency transmissions has increased dramatically over 
the past 30 years, and especially over the last ten years.

2. Radio frequency interference (RFI) has been a problem noticable by anyone 
who watches TV when a neighbour is using an unsuppressed drill or an old 
motorbike with unsuppressed magneto goes by.  That band of 'noise' across the 
screen is RFI.

3. Placing your cell 'phone next to your PC monitor can cause similar effects 
when the 'phone rings.  It can even cause audible noise!

4. My cell 'phone causes noise on my wireless 'phone when it rings.

5. Airlines ban the use of electronic devices (computers, 'Game Boys' (TM), 
etc.) on take-off and cellular telephones throughout the flight for one very 
good reason.  They all emit some RFI - wheich can interfere with the 
aircraft's systems (especially on modern 'glass cockpit' aircraft).

6. Digital cellular telephones try periodically to 'log-on' to a cell.  This 
emits a radio signal.  [BTW - it is this aspect which the UK police are using 
in a number of criminal trials at present - to identify whereabouts a cell 
'phone (and its owner) were (or more actually to demonstrate that an alibi 
given is false).]

7. Crypto manufacturers spend nearly as much time in designing their systems 
not to be affected by RFI as they do designing them to eliminate emissions in 
the RF (radio frequency) or other bands.

8. In the near vicinity of a strong transmitter, radios and TVs (sound only) 
can operate without being switched on - owing to the strength of the IF 
(intermediate frequency) signal being received.

9. Radio controlled models have gone out of control when in the vicinity of a 
strong transmitter.

10. In the UK the use of CB radio and cellular telephones are prohibited in 
filling (gas) stations - for the excellent reason that a transmission (such as 
a log-on for a cell 'phone) may cause a spark from the aerial to grounded 
metal (such as the filling station roof supports).

There's a lot of energy in a radio signal.  Just because you can't see it, 
doesn't mean it ain't there!  That means there's also a *lot* of potential 
(pun intended!) for mischief and abuse.

I have been advising clients that they should take the following steps in 
designing computer and communications suites that are 'safe' from RFI.

a) Provide a Faraday cage around all equipment processing highly sensitive 
data (such as crypto).  A Faraday cage is a continuous (in the sense of an 
electrical circuit) screen (usually of copper mesh) which is positively 
grounded.

b) Prohibit radio transmitters (such as cellular telephones) in all suites, 
but especially ban them from:
    - all areas protected by Faraday cages (the cell 'phone tries continually 
to log-on to a cell and the signal just 'bounces around' inside the cage);
    - all battery - such as UPS (uninterruptible power supply) rooms (a spark 
could ignite the hydrogen given off by battery charging);
    - all rooms housing electronic equipment such as computers or 
communications systems (for reasons of obvious interference);
    - all rooms housing radio or near radio frequency controlled devices (such 
as I found on a pipe-laying barge for operating the massive cranes used to 
lift 44" diameter pipes, thirty feet long, weighing several tonnes) - 'cos you 
don't want one dropped on your head!;
    - all 'radio communications' rooms (again for obvious reasons).

c) Ensure that all metal in and immediately around computer and communciations 
suites (such as ceiling tile support framework, raised floor supports and 
tiles) are electrically bonded together, or at least that they make good 
electrical contact (i.e. with minimum resistance).

d) Provide a 'signal earth' (sometimes called a 'clean earth') to which all 
earths (or 'grounds') are taken.  This should be (say) a separate 'earth 
spike' (in the soil beneath the building) and not the normal earth in the 
power plug/socket.  Check for pd (potential difference) between power and 
signal earths (and cabinet earth, if separate from power earth), and consult a 
specialist if this is more than a fraction of a volt.  Consider that if you 
take it to the building frame, this could provide a simple 'covert path' for 
the transmission or interception of sensitive data/signals from your 
computer/communications systems.

BTW - has anyone considered the potential for cellular telephones to provide 
an excellent medium for 'van Eck monitoring'?  Yet another reason for banning 
them from computer suites.

And while we're on that topic, an open cell 'phone circuit would provide a 
useful 'bug', and given their ubiquity, a cell 'phone arouses no suspicion 
when placed on your desk - yet could be, or conceal, a 'bug'.

Think about it!

Michael (Streaky) Bacon
Tel: +44 (0)171 311 5033
Fax: +44 (0)171 311 5836
http://www.GeoCities.com/CapeCanaveral/1948/
-----------------------------
"I know I'm paranoid but, ...
   am I paranoid enough?"
-----------------------------
**************************************************************************
3)From: John Wiseman 
Subject: Microphone identification?
  
I would like to know the manufacturer of the extremely small microphones that are sold by most spy stores. The ones i have seen are flat with an 1/8 inch tube like protrusion on either the flat side or on the the top. This tube allowes the speach in. It also has a K on it that looks like a lightning bolt. I would be like to thank you in advance for any help you might give me in this matter.
sincerely

John Wiseman
usap@tiac.net

+++Moderator's Note+++

They are manufactured by Knowles Electronics in Itasca, IL Tel: 708-250-5100 Fax: 708-250-0575. The model you refer to is the BT series. They sell wholesale for around $13.00 USD each in lots of 50+. P.S. If anyone wants to know the manufacturer or source of any item sold by a "spy shop" let me know and I will advise. 
**************************************************************************
4)From: ERIC C HART 
Subject: Does anybody know.....?
 
I saw a vehicle yesterday, a Navy P/U truck, marked with official
markings, and a roll bar in the back. On the top of the roll bar
were two "antennas"??  that were fastened to the roll bar. Above
the pipe was a flange that had a number of pieces that looked
like they came from a TV antenna, pointed downward like a half
open umbrella. Above the flange was a grey PVC tube that was
sealed on the top and had markings on it. There were two of 
these, the one on the right larger, and the other smaller. Does
anyone know what this is used for ?  I'd really like to know so I
could forget about why I don't know what it is.

Eric Hart
Intell Service Group  -  intell@coqui.net
**************************************************************************
5)From: "L. J. Strand" 
Subject: It might be of interest 

Found this article, it might be of interest. (sience-fiction is here!)

Multipurpose Surveillance and Security Mission Platform

The Multipurpose Surveillance and Security Mission
Platform (MSSMP), started in FY'92 as the Air-Mobile
Ground Security and Surveillance System (AMGSSS), is
designed to provide a rapidly deployable, extended-range
surveillance capability for a variety of operations and
missions, including: fire control, force protection, 
tactical security, support to counterdrug and border
patrol operations, signal/communications relays, detection 
and assessment of barriers (i.e., minefields, tank traps), 
remote assessment of suspected contaminated areas 
(i.e., chemical, biological, and nuclear), and even resupply 
of small quantities of critical items. The MSSMP system consists of
three remote sensing packages and a base station.

MSSMP system requirements include: 

High mobility, Remote operations over low-bandwith tactical radio links,
long-endurance surveillance capabilities, and The ability for one operator
to supervise several remote systems. The MSSMP sensor packages may operate
as portable stand-alone units, or from air-mobile platforms. The current
design of the air-mobile platforms is based on the Sikorsky Cypher
ducted-fan vertical-take-off-and-landing unmanned air vehicle. This
air-mobile platform carries its sensor package from one ground surveillance
location to another, up to 10 km from the base station.

Each sensor package is mounted on a pan-and-tilt unit, and includes: 

Visible light video camera 
Infrared video camera 
Laser range finder 

In addition, a link is provided for an optional portable acoustic sensor.

To keep radio activities to a minimum, most sensor processing is performed
by the remote payload. Acoustic and visual motion detection are used to
detect, identify, and locate targets of interests. Preprogrammed responses
are activated upon detection and may include only an alert to the operator,
or automatic transfer of a static image, laser range or an image stream. For
the prototype unit, the operator's control
display station is a laptop computer running a graphical Windows program.
All commands to the remote sensors are initiated using the built-in keyboard
and pointing device. All data and images sent back are displayed on the
laptop's color monitor. Communication between all subsystems, except for the
radio link, uses Ethernet and the TCP/IP protocal. Development of the MSSMP
system is on-going. A portable mission payload prototype package has been
developed by a team of XXXXXXXXXX engineers and scientists, and an
additional payload package has been integrated onto the Cypher vehicle by
Sikorsky and XXXXXXXXXX engineers. In May 1996, the system was successfully
demonstrated at the Military Police School at Ft. McClelland, AL, in a
simulated counter-drug operation. The man-portable sensor package mounted on
a ground vehicle-of-opportunity and the Cypher-mounted sensor package were
operated simultaneously over the same radio link.

In January 1997, the MSSMP system's expanded role was demonstrated in a
Military Operations in Urban Terrain scenario at the Dismounted
Battlespace Battle Laboratory, Ft. Benning, Georgia. The system demonstrated
reconnaissance support with the vehicle flying down city streets, looking
through lower- and upper-story windows, providing lookout support ahead of
advancing troops, and performing observations after landing on the roof of a
two story building. The vehicle also
dropped a simulated radio relay on the top of a building, a miniature
intrusion detector in an open field, and carried a standard Army laser
rangefinder/designator as a payload.

Bigbrother are whatching!!!!!!!

L. J. Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
6)From: "L. J. Strand" 
Subject: re: Russian Spy Satellite pictures

Some time ago, somebody asked where Russian Spy Satelit pictures may be
obtained. 

The answer to that: At MicroSoft! According to an article in Wall Street
Journal, MicroSoft will supplye photos from Russian spy Satelites taken
during the 90's. 

The first available photos will be over some European and American major
citys. They will be available from the end of march at a nominal fee. To the
curtesy of Wall Street  Journal.

L. J. Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
7)From: SpyKing@thecodex.com
Subject: Telephone FAQ

For those who might be interested in knowing a little more on the workings of telephone systems you might visit: http://mirror.lcs.mit.edu/telecom-archives/archives/new-readers/frequently.asked.question
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 48


******************************************************************************
Vol.Two Issue #48          The Surveillance List           Feb.21,1997        
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) re: Looking for a single enclosure...   
02) Re: CMOS Passwords  
03) re: CMOS password  
04) Spy Shop Suppliers
05) Re: Washington Post Article on Scanner Listeners
06) Re: Tracking Device?  
07) Re: Looking for a single enclosure...
08) re: CMOS Passwords 
09) laptop tracking"
10) re: vehicle alert
11) Dear Abby?
12) re: CMOS Password & Question
13) Interesting Article
14) Vehicle Alert Response
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: "Walstrom, Bradley" 
Subject: re: Looking for a single enclosure... 
 
>8)From: arc333@webtv.net (Alan Corin)
>Subject: Looking for a single enclosure...

>which contains a low power FM transmitter and a digital tape unit that   
is
>capable of continually playing a message over and over. the player   
recorder
>could also be analog with a loop tape. the transmitter similiar  to the   
low
>power wireless michrophones that broascast on the FM band. If you can   
bjild
>this can you quote a price for a prototype. THanks' Alan Corin. I forgot   
it
>must also run on AC.

Alan

I think you can do one stop shopping at agrelo's web site.

              http://home.navisoft.com/agrelo/ae.htm

They offer a 800mw crystal controlled FM transmitter that is only 1.92 X   
..536 for $130.00   They also have an electronic analog voice recorder   
that is 1.83 X 1.02  that comes in three message sizes, 20 60 or 90 seconds,   
starting at $70.00.  The units are DC but there is no reason that you   
couldn't use a wall transformer.  They can also be reached at   
1-800-588-4300

If you want to transmit in the commercial FM band  (88-108) try Ramsey   
for the transmitter.
              http://www.ramseyelectronics.com/

Brad Walstrom  
**************************************************************************
2)From: CrACKeD 
Subject: Re: CMOS Passwords


Mike, you must locate the CMOS battery.  If you don't know the password,
there is no other software-based solution to your problem.  Once you find
the battery, you need to remove it and either let your system sit for a
while or you can speed up the process by shorting the two battery contacts
(on the motherboard, NOT on the battery).  Some motherboards have a jumper
which will bypass the internal battery and/or clear the CMOS password, but
since you're using a 386 I would doubt very much yours does. You'll need
to reconfigure the settings in the CMOS BTW, as clearing the password in
this way also clears all other saved CMOS data.  Good luck.

CrACKeD 
**************************************************************************
3)From: Stuart Krone 
Subject: re: CMOS password

     >Is there anyone who can help?  I need to get around the CMOS
>password.  I have a Cardinal SB386SX Motherboard using American Megatrends 
>Inc. I have already tried "AMI" and that didn't work.  I tried to pull the 
>battery out, but I couldn't budge it.  (I'm not even 100 percent sure I was 
>pulling the right thing.)  Certainly there is some savvy hacker jout there 
>who knows a way around the CMOS password.

        I used to be the systems manager in charge of a fairly large LAN 
(300 + nodes). I had users set the password and forget, quit, leave etc ...
        Almost every motherboard has a proprietary way to wipe out the cmos 
password. On the particular NCR system we had, there were a set of pins you 
could short to kill the password. 
        I would suggest either you contact the motherboard manufacturer or 
the company who sold you the system. If this doesn't work or they are not 
willing to tell you (many won't) your only other option is to pull the cmos 
chip or the battery. My favorite is to yank the battery connection. It is 
quick, easy, safe and it always worked.

Hope this helps,

Stu
**************************************************************************
4)From: browngrp@southeast.net
Subject: Spy Shop Suppliers

>. P.S. If anyone wants to know the manufacturer or source of any item sold by
> a "spy shop" let me know and I will advise. 

We at Steven K. Brown & Assoc.. are planning to open just such a 
shop in the North Florida area and would very much appreciate your 
information on manufacturers and suppliers.

Thanks,

Robert Plance
Investigator@Private-Eye.com
href="http://www.Private-Eye.com"
Criminal Records-Driving Histories-Background Checks-Locate Individuals
On-Line order form for Investigative Services.
Protect Yourself, your family, your business, your customers.

+++Moderator's Note+++

I've got over 2800 companies worldwide in my database that sell something or other that could be used for surveillance, countersurveillance or investigative purposes... if you've got a specific question about a specific product or need to know where to get it directly I'll be happy to provide info...
**************************************************************************
5)From: "David S. 'Greeny' Greenberg" 
Subject: Re: Washington Post Article on Scanner Listeners
  
> 4)From: SpyKing@thecodex.com
> Subject: Washington Post Article on Scanner Listeners
> 
> Scan You Dig It?
> By Craig Stoltz
> 
> [clipped]
>
> The better question is why anybody uses one. Schrein says 90 percent of
> first-timers use a scanner to monitor "their neighborhoods--police and fire,
> taxicabs, utility companies" and so on. (See Radio Shack catalog pitch at
> left). We're talking a very high noise-to-signal ratio here, with many
> transmissions of numbing mundanity. "Most people say they learn things they
> can't get anywhere else, like where burglaries are, where drug traffic  is,
> that sort of thing."
> 

I have a scanner and I use it mostly for scanning around to see what I
can find.  But one particularly memorable time I was an unwilling
participant in a major power outage courtesy of Commonwealth Edison and
couldn't get thru to report the problem and wanted to know when the
power'd be back on...  So I locked onto the ComEd frequencies and
listened to the repair crews...  Knew precisely when the power would be
back, and where the problem was...  My neighbors still think of me as
possessing god-like powers for that prediction ;->

Also, I used to own some rental properties that I leased out to
students...  Hardly a weekend went by w/o me having my scanner on to
find out if they were having *BIG* parties @ my houses (in violation of
the lease agreement) -- The cops would get a complaint, and would fire
off the name/address across the airwaves, so I'd meet them there (or
shortly thereafter) to assess the damage and sometimes give the tenants
a notice to quit (unless they fixed what got trashed)...  Was worth
every penny...

Also very useful for tuning into the aircraft frequencies to listen to
the tower communications when you're stuck on the tarmac and the Pilot
is feeding you a line of crapola...

> "Actually, I'm getting a little tired of it," Schrein confesses. "You can
> get kind of burned out."
> 

True, true...  Scan in moderation...
**************************************************************************
6)From: "David S. 'Greeny' Greenberg" 
Subject: Re: Tracking Device?  
 

> 2)From: n2roses@catalinas.net
> Subject: Tracking Device?
> 
> I have a 14yr daughter.  I want information on tracking
> device to help me locate her when she decides to split.
> I work long hours and have 6 children.  My 14 yr is putting
> my patience to the test.  If I know where she hangs out,
> I can know if she is in trouble or causing trouble.  We
> live in a one square mile town, on Catalina Island.  She
> can't go too far... but where does she go?
> 
> I hope this does not seem like a stupid request, I am quite
> serious.
> 
> Thank you, sincerely.    A trying-to-be-a-good parent.
> 

Hmmm, I could recommend the X-Files 'chip-under-the-skin' bit, but ...

Seriously, how about asking her where she goes?  Tell her you're
worried... Most likely she's hanging out with friends, or some boyfriend
and doesn't want you to know because of the usual adolescent fears
(think back to when you were 14 and the stupid stuff you didn't tell
your parents ;->)  If you were to get a tracking device, where would you
hide it anyway?  If she knows about it, it's not going to be utilized...
if she doesn't know about it and it gets damaged, then it's useless, or
if she doesn't know about it and finds out about it, she's going to be
super pissed off at you and you'll really have a big problem on your
hands...

Going back to my childhood, I pretty much had the freedom to go where I
wanted (for the most part), but I had to either 1) call mom and let her
know where I'd be and when I'd be back or 2) Leave a note...

Either one of those might work...  Or how about getting her a pager? 
Then when she vanishes, you page her and she calls you back in 5-10
mins...

As I'm sure you know, it's only gonna get worse as she trudges thru
adolesence so now's the time to get the bad habits changed!

Good luck
**************************************************************************
7)From: mjones@nbserv2.dseg.ti.com (Marty Jones)
Subject: Re: Looking for a single enclosure...
 
 **************************************************************************
> 8)From: arc333@webtv.net (Alan Corin)
> Subject: Looking for a single enclosure...
> 
> which contains a low power FM transmitter and a digital tape unit that is
> capable of continually playing a message over and over. the player recorder
> could also be analog with a loop tape. the transmitter similiar  to the low
> power wireless michrophones that broascast on the FM band. If you can bjild 
> this can you quote a price for a prototype. THanks' Alan Corin. I forgot it 
> must also run on AC.

Alan,

Check with some of your local realtors.  They will be able to point you to 
sources for one of their advertising devices that does just this.  One trade
name is "Talking House!", I'm sure there are others.  The device is a low-power
FM transmitter coupled to a solid-state memory for a minute or so of voice.
The realtor records a sales pitch for the house, plugs the device into the 
wall in the living room, and plants a sign in the front yard that tells passers-
by to tune to the correct FM frequency.  The older models were tape-loop, the
new ones are solid-state and really small.

Best regards,

Marty Jones
mjones@nbserv2.dseg.ti.com


+++Moderator's Note+++

Checkout: http://www.decade.ca/ You will find the low power transmitters Marty is talking about there... I found one of these devices one time during a TSCM survey. It was being used to harrass a client (upstairs tenant) who played their radio too loud according to the perp. He used to tune it into the freq being played on the client's radio and interfere sending threatening messages using a "spy shop" type voice changer. 
**************************************************************************
8)From: "Seagraves, Glenn" 
Subject: re: CMOS Passwords 
 
Most System/Mother boards have a jumper you can remove, place on a   
different combo of pins, wait around 30 seconds and move it back.  This   
will clear the CMOS.  It should be documented in your paperwork for the   
board.

Glenn Seagraves
glenn.seagraves@ColumbiaSC.ncr.com


>6)From: "Michael K. Brady 1-904-546-5925" 
>Subject: CMOS Passwords

>Well, I did it.  And surely I'm not the only one out here who has!  Will   

>anyone else admit that they put a password on their CMOS setup  then   
forgot
>it?  I did!  For shame!  I could insist that the old password won't work   

>anymore, but no one will buy that.
>       But what can I do about it?  I need to sell the system so that I
>can upgrade, and I don't feel right about selling it and not telling   
about
>the password problem.  What if the buyer wants to upgrade and can't   
because
>he (and I) don't have the password?
>        Is there anyone who can help?  I need to get around the CMOS
>password.  I have a Cardinal SB386SX Motherboard using American   
Megatrends
>Inc. I have already tried "AMI" and that didn't work.  I tried to pull   
the
>battery out, but I couldn't budge it.  (I'm not even 100 percent sure I   
was
>pulling the right thing.)  Certainly there is some savvy hacker jout   
there
>who knows a way around the CMOS password.

>Thanks,
>Mike Brady
>bradym@mail.firn.edu
**************************************************************************
9)From: Stanley Corwin 
Subject: laptop tracking

Dear Spyking or list memebers,
One of my clients is suffering losses from employees stealing laptop 
computers from his facility. Is there any kind of tracking device that 
can be put in a laptop to track its whereabouts? Tracing through a modem 
after logon is no good if they replace the modem card, correct?
Thanks,
Stan Corwin
Spy Store
www.spy-store.com
spystore@laker.net

+++Moderator's Note+++

Try: http://www.computersecurity.com/comptrac.htm they sell computrace software. I believe the software is transparent to user and will work with any modem that is plugged in... evidently it calls an 800 number after disconnecting the target computers modem speaker...
**************************************************************************
10)From: "L. J. Strand" 
Subject: re: vehicle alert

Re: jeff davis 
Re: Subject: vehicle alert

>I am interesting in buying a special little device for added security in
>my vehicle and would like to know if you have such a device, suggestions
>for such a thing or can make it.

A very simple device you could use (witch you could build yourself) is to
connect a pager ei. 'MOTOROLA ECHO' from the conections on the sircut board
witch lead to the "vibrator" over a solenoid witch is put to shut of the
main power switch in your car (ignition key) This makes it possible to turn
of the power in your car wherever your car may be. (in limits) We use a
simular device in our "security cars" but ofcourse coded!!!

L. J. Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
11)From: PRV8EYE@aol.com
Subject:  Dear Abby? 


Subject: re: CMOS Password & Question

First off hats off to Spyking and the list. Well, onto the question.
I jave been known to just leave the thing off until the battery dies.
Depending on the kind of MB I think there is sometimes a Jumper that you
can remove to reset the password. Check the manuals, and if you can't
find it in there, contact the Maker of the MB and tell um you  need to
know where that jumper is, or how pull out the battery.

Okay Now I have a question. Its kinda off topic but I think most people
here would be able to answer it. Now I know that Aircraft radios
Brodcast and recieve in the FM band around 109 and up. Is there any way
to modify these radios to brodcast on lower freq.? like say 88 - 107.
**************************************************************************
13)From: SpyKing@thecodex.com
Subject: Interesting Article

I found this and thought it of interest to the list...

WASHINGTON (AP) - In the 1993 bombing of
                    the World Trade Center, a police officer, on a
                    rescue mission, could not talk to a firefighter just
                    one level up on the 99th floor - even though they
                    both had mobile phones.

                    The situation, experts say, is typical. Public safety
                    groups and the Justice Department have complained
                    that incompatible communications systems can
                    hamper rescues.

                    The Federal Communications Commission took a
                    step Thursday that should ease - but will not solve -
                    the problem of emergency communications systems
                    that cannot talk to one another.

                    The FCC pooled roughly 1,100 frequencies
                    previously reserved for specific public safety groups
                    and made the channels available to all the agencies.

                    This way, local police departments, for instance, will
                    not be restricted to the 740 frequencies set aside for
                    them but can choose among the 1,100 available.

                    Public safety groups can take advantage of the
                    change in about six months, the FCC said.

                    The FCC says the new rules should make it easier
                    for police, fire, rescue and other emergency
                    organizations to coordinate frequencies so that new
                    communications equipment - cellular phones, radio
                    and other devices - will work on the same
                    frequencies. That lets communications devices be
                    ``interoperable'' - meaning a police officer can talk
                    via radio to a firefighter.

                    Most public safety agencies now use different
                    frequencies so that their equipment cannot talk to
                    one another.

                    The FCC also said its action should particularly help
                    public safety groups in urban areas, where
                    frequencies are severely congested.

                    ``We have to provide adequate spectrum for public
                    safety needs,'' said FCC Commissioner Susan
                    Ness.

                    Public safety groups are working to win additional
                    frequencies, which would go far in solving the
                    interoperability and congestion problems.

                    In his 1998 budget, President Clinton proposed
                    taking four channels now used by TV broadcasters
                    and making them available for police, fire, rescue
                    and other emergency organizations.

                    The proposal, supported by the Justice Department,
                    mirrors a plan by the Senate Commerce Committee
                    chairman, Sen. John McCain, R-Ariz. The
                    broadcasting industry opposes both efforts.
**************************************************************************
14)From: Trace Carpenter 
Subject: Vehicle Alert Response

Jeff, 

There are all kinds of vehicle burglar alarms out there with a pager 
which you carry with you which will accomplish your task.  RadShk has 
them.
-- 
Sincerely,

Trace Carpenter,P.I.
214.828.4520
214.828.1917 Facsimile
**************************************************************************

Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 49


******************************************************************************
Vol.Two Issue #49           The Surveillance List            Feb.22,1997        
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Monitoring Cell Calls THE FAQ's  
02) Tracking a 14 Year Old 
03) Help Response 
04) People Tracking  
05) CMOS Password Response
06) re: CMOS Password
07) Good Tech Joke
08) Computer crashed
09) Best schools?
10) Re: CMOS Password & Question
11) Seeking a English or American CD dictionary
12) In search of
13) SL Suggestion
14) Re: EMP Generators
15) Tracing persons from the use of their credit card
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: SpyKing@thecodex.com
Subject: Monitoring Cell Calls THE FAQ's

There is a lot of interest on this list regarding monitoring cellular calls. Checkout the FAQ's at: http://www.geocities.com/Heartland/6095/CELLFAQS.HTM
**************************************************************************
2)From: Trace Carpenter 
Subject: Tracking a 14 Year Old

>I have a 14yr daughter.  I want information on tracking
>device to help me locate her when she decides to split.

Interesting problem.  A good bit of the work we do here is because 
parents need to keep up with what their children are doing.  In the 
years I was with the police department it never ceased to frighten me as 
to the things that kids would get into.  Actually, it wasn't so much 
what they go into, but why they did it and what could the parents have 
done differently to stop it.  The scary thing was, we couldn't think of 
anything.  The kid's had it all and just took a wrong turn.

Anyway, enough of that.  As for your question, herein lies the problem. 
 To track her, (electronically anyway) she has to have the transmitter 
with her.  Since she doesn't drive a car that rules planting it in the 
auto out.  How  does she get around?  Does she ride a bike?  You may be 
able to plant something there.  The problem is that the smaller the 
battery and transmitter are, the shorter the battery life and range of 
the transmission is.  If you're looking for something you can place in 
the hem of her jacket and will transmit a mile, it's not going to work. 
 We put a transmitter in a beeper a while back, but the range wasn't 
that great.  You'd have to have an idea what house she was in and 
proceed to that area.  A lot of parents just monitor the conversations 
and work it from there.  With 6 kids that may be easier as you wouldn't 
have to drive around town.

Just some thoughts, hope it helps.  If you can supply some feed-back 
about transportation etc. such as a boyfriend's car she rides in, bike, 
etc. maybe we can help.
-- 
Sincerely,

Trace Carpenter

Trace Carpenter Investigations       Professional Private Investigations
660 Amberton Tower                          Suspicions Confirmed
4144 N. Central Expy.                         Problems Solved !
Dallas, Texas 75204                          Free Consultations
214.828.4520
214.828.1917 Facsimile
**************************************************************************
3)From: Trace Carpenter 
Subject: Help response

>3)From: Rose Lewis 
>Subject: help
>
>could you direct me to someone who can get into a cable company's
>computer and make it look like the bill is paid??

Discretion being the better part of valor, I think I'll bow out on this 
one.

+++Moderator's Note+++

Heh-Heh-Heh - sounds like the thought police trying to scoop someone up...
**************************************************************************
4)From: Excelsior 
Subject: People Tracking

A countermeasures friend of mine was recently asked by a client if a product
exists that could discreetly monitor the whereabouts of executives and their
family members.  Naturally, the device would have to small enough to fit in
a pager or watch so as not to arouse suspicion from kidnappers.  Cost is far
less important that quality and reliability for this particular application.
Please e-mail with any possible leads.

Regards,

Patrick McKee
Excelsior Services, Inc.
5337 College Avenue, #745
Oakland, CA 94618-1614
510.595.0412

Private Investigation
Covert Surveillance Equipment-
Rental, Sales, Service
**************************************************************************
5)From: Trace Carpenter 
Subject: CMOS Password Response

Hi Mike:

Don't you hate it when that happens!  Well try this.  Next to the 
battery there is often a jumper, like one you would use to set the com & 
IRQ on a modem.  Pull the jumper.  That's where the battery power passes 
through.  It'll take a while for the power to drain down on some.  If 
you're impatient, shunt the post to ground and that'll speed things up. 
 Then reboot.  If it still wants a password at that point use AMI.  You 
can also try pulling the chip itself which will open the circuit.  
-- 
Trace Carpenter,P.I.
214.828.4520
214.828.1917 Facsimile
**************************************************************************
6)From: Medic 
Subject: re: CMOS Password
 
I don't know your real intentions but the quick fix should be real easy. 
All you have to do is look for Jumper 7 or the internal/external Battery 
selector jumper. This should be a four prong set. form there what you 
want to do is switch the jumper cap to the other prongs and start your 
machine up. You should remember where they originally were because you 
will have to return it there. When you start up the machine you should 
get a message similar to "CMOS error.....Defauat values loaded" After you 
het this message you will then have to shut down the machine and put the 
jumper cap in its original position.

This can also be used to break into a system that has a password you 
don't know. Or to lock another person out of their system.

Ok this should work. Good luck.
**************************************************************************
7)From: Trace Carpenter 
Subject: Good Tech Joke
 
A helicopter was flying around above Seattle yesterday when an electrical malfucnction disabled all of the aircraft's electronic navigation and communications equipment.  Due to the clouds and haze, the pilot could not determine the helicopter's position and course to steer to the airport.  The pilot saw a tall building, flew toward it, circled, drew a handwritten sign, and held it in the helicopter's window.  The pilot's sign said "WHERE AM I?" in large letters.  People in the tall building quickly responded to the aircraft, drew a large sign, and held it up in the building's window.  Their sign said 
"YOU ARE IN A HELICOPTER."  The pilot smiled, waved, looked at his map, determined the course to steer to Seattle/Tacoma airport, and landed safely.  After they were on the ground, the co-pilot asked the pilot how the "YOU ARE IN A HELICOPTER" sign helped determine their position.  The pilot responded "I knew that the tall building had to be MICROSOFT headquarters because they gave me a technically correct, but completely useless answer."
-- 
Trace Carpenter,P.I.
214.828.4520
214.828.1917 Facsimile
**************************************************************************
8)From: tim johnson 
Subject: Computer crashed
 
For those of you who provided me with your e-mail addresses, I'll need them
again. I had a computer failure that wiped out my e-mail lists and
completely filled my internal drive. The only effect to the extgernal drive
was the erasure of the e-mail lists.

I had to transfer all files and folders to ther external, reformat and
reload everything I needed to get up and running.

The failure occured when I installed a 12X CD-ROM drive, associated
software and Eudora Pro. The problem was the 12X drive.

Anyhow, if you'll be so kind as to provbide me with your address aga in,
I'll make a backup copy on a regular basis.

Thanks,

Tim Johnson

Tim Johnson    dbugman@amug.org
Technical Security Consultants Inc
(602) 786-0909
http://www.amug.org/~dbugman/
What you say in private is your business.
	Keeping it private is ours. (c)TSCI 1987                                  **************************************************************************
9)From DELEONFAM@aol.com Fri  
Subject: Best schools?

Hello,
I'm looking for the best schools in Surveillance and Counter-Surveillance. I
have 11/2 years to learn some basics about the trade before I get out of the
Military. I would like to have enough training to enter a PI agency or
Business Intel firm. I currently work as IS in the navy. Any help would be
greatly appreciated. Thanks Mark.
**************************************************************************
10)From: CrACKeD 
Subject: Re: CMOS Password & Question
 
> Okay Now I have a question. Its kinda off topic but I think most people
> here would be able to answer it. Now I know that Aircraft radios
> Brodcast and recieve in the FM band around 109 and up. Is there any way
> to modify these radios to brodcast on lower freq.? like say 88 - 107.

Aircraft radios operate on AM, not FM.  If you want to start your own
pirate radio station, be advised there are much better routes to take. 
Depending on your particular radio, you may be able to get it to transmit
into lower frequencies, but getting it to transmit on FM will be virtually
impossible. There are a few FM ham rigs out there which will transmit as
low as you want to go (when modified), but they aren't very efficient when
operating too far out of their native bands.

CrACKeD 
**************************************************************************
11)From: ole.worm@post2.tele.dk (Worm, Ole)
Subject: Seeking a English or American CD dictionary
 
Dear members,
I'm seeking a English or American CD dictionary 
who use real sound pronunciation trough the 
PC loudspeakers - any suggestions ?

Best regards
Ole Worm
*******************************************************
Pi-Consult Investigations and Security Denmark 
Vester Voldgade 83, DK 1552 København V.  
Tel. (+45) 70209905 <> Fax. (+45) 53708611 
http://www.profil.com/piconsult/picuk.htm      
*******************************************************
**************************************************************************
12)From: JEasom1046@aol.com  
Subject: In search of

In search of Electronic Countermeasures equipment. Must be State of the Art.
Alsointerested in Computer security systems and FAX protection devices. 
JEasom1046@aol.com
**************************************************************************
13)From VIPER113@aol.com Fri Feb 21 18:54:25 1997
Subject: SL Suggestion

I am a subscriber to the Surveilance List and so are many of my friends that
I told about the SL.  Anyway, we all came up with a suggestion that would
both benefit you, who put it together and us, who read it.  especiall if you
are like us to want to read them and save them for future reference.  It is
very hard to do that though when you send many a week.  I recieved 3 in one
day.  And if you haven't checked your mailbox for a while, then you get a lot
of files to save which is very time consuming.  I am sure that you putting
together the SL is also time consuming.  So I propose this plan which I hope
you will deeply consider and put into action.   

You should collect all the postings that subscribers send to you, for one
week.  Than at the end of that week send out one Surveilance List e-mail to
all the subscribers.  To even make it better, make them all attached files so
we can directly download them.  And after one week the SL might be pretty big
so you might have to turn it into an attached text file.

This plan, I am sure will be much better for all those subscribers who want
to save all the "SL's." 

Thank you for your time and effort,
VIPER113@aol.com
Subscriber 
**************************************************************************
14)From JEasom1046@aol.com  
Subject: Re: EMP Generators

 I too am searching for EMP Generators. Anyone with information please
respond to
JEasom1046@aol.com Also.

Thanks, 
**************************************************************************
15)From: amaci@starnet.net.ph Sat Feb 22 00:46:54 1997
Subject: Tracing persons from the use of their credit card
 
Hi  my name is  Raymond Jackson, I  have been living in the phillipines
for  the past 15 years, I want to know if any one on 
the list  can  point me in the direcrtion to trace someone of which
the only info I have is  whats on a credit card they used at a certain
place  I will need to get  some more info about this person. Thanks 
for any tips, Can be contacted at amaci@starnet.net.ph
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 50


******************************************************************************
Vol.Two Issue #50          The Surveillance List            Feb.23,1997        
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Re: SL Suggestion  
02) Starting PI Company  
03) Interested in a few items  
04) DMV WebSite 
05) Wiretap
06) Rubber Bullet Guns
07) Detecting passive microphones
08) Two party states
09) Re: trojan horse program  
10) Help!
11) re:CMOS passwords
12) Free software will transform PCs into untappable telephones
13) Echelon/Oratory/Finding someone
14) re: Best schools? 
15) re: weekly v daily list
16) More Cellular
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From brozenske@juno.com  
Subject: Re: SL Suggestion
 
snip
You should collect all the postings that subscribers send to you, for one
week.  Than at the end of that week send out one Surveilance List e-mail
to all the subscribers.  To even make it better, make them all attached
files=so we can directly download them.  And after one week the SL might be
pretty= big so you might have to turn it into an attached text file.

This plan, I am sure will be much better for all those subscribers who
want to save all the "SL's."
snip
***********
I, for one would be very opposed to this suggestion, as it would mean I
would get no more Surveillance List messages.  My email provider has a
55K byte size limit for messages, after which the messages bounce back to
sender. 

In addition, the timeliness of messages waiting a week for distribution
would seriously degrade the usefulness of the list. I save all the list
messages to a special folder - very little time required, and they are
all there for reference whenever I want to look.

PLEASE don't do anything like this.... :-(

Regards,
Barrie Brozenske
brozenske@juno.com
PGP Public Key fingerprint =  98 15 70 56 65 E5 D1 FA  A7 AF 1B 9E B8 C0
F4 5E
**************************************************************************
2)From: James Petree 
Subject: Starting PI Company

I'm looking for ANY information on the surveillance and private
investigation profession. Myself and a friend are considering starting a
private investigation company, and need leads. Any information would be
greatly appreciated. Thanks.
**************************************************************************
3)From: ProvRhode@aol.com
Subject: Interested in a few items

Hi,
        
I'm interested in a few items, all of which will help me become aware
of any cheating that my soon to be wife may or may not be doing.  One can
never be too safe nowadays when about to marry.. Anyways.. I'm looking for a
tracker that can be placed in a car and will highlight where the car is.
 
Preferably 10 square miles in range.  You know what I'm looking for, the
things they always show in movies which pinpoint a persons exact location by
a blinking dot on a computer screen..Does such a thing exist or only in the
movies?
**************************************************************************
4)From: RFrench274@aol.com
Subject: DMV WebSite  

Hi,i have a question.Is there a website where i could run someones license
plate?I prefer a site on the web that's free of charge to access records.Let
me know !
**************************************************************************
5)From Wilgetum@aol.com  
Subject: Wiretap

Events, tests and physical searches have proven that a telephone is being
tapped within the Phone companys' offices. Please don't tell me I'm wrong.
Would someone who knows tell how it might be done by an employee without the
phone company knowing.   

Is there more than one location available for a physical tap? Can somebody
program some software to make an 'invisible' tap?

The normal channels of complaint do not work. I would like some technical
knowledge before approaching the phone co. through some channel that wouldn't
alert the person involved.

wilgetum, bygum
**************************************************************************
6)From: "Integris International, Ltd." 
Subject: Rubber Bullet Guns

Please excuse this posting if it is not appropriate for this list. I
assume there are a large number of law enforcement personnel lurking
here - I direct this question towards them:
Can anyone direct me to a manufacturer of "rubber bullet guns" used for
crowd control, anti-riot, etc.?  Any information would be greatly
appreciated.  Thank you. 
Joe Chapuis
JPC@TradeBrokers.com
**************************************************************************
7)From: net-cafe@net-cafe.es
Subject: More info about detecting passive microphones (tags, microwave resonators)

As far as I know there is a kind of microphone that does not need a
battery. It is call tag or passive microphone. It seems to me that uses
a microwave field to obtain its energy for RF broadcasting. Could you
tell me if is there any scanner or detector to detect it ?

Thank you very much. I am looking forward to hearing from you very soon.

Manuel Cornejo
**************************************************************************
8)From: kwharton@ix.netcom.com
Subject: Two party states

Regarding your information you have provided dealing with surrepticious
recordings, if a person doing the recording is calling from a "one
party" State to an individual in a "two party" State, do you know
whether or not that would be legal?  If I am correct, in "one party"
States only one person to the conversation need only know that the
conversation is being recorded?  Must the person in this situation be
the actual person doing the tape recording or can it be someone who is
not part of the conversation?  Can you provide the answers to these
questions or tell me if you have a web site that covers these issues?  

Thanks,

Keith
**************************************************************************
9)From: MikeRowley@aol.com
Subject: Re: trojan horse program  

<< Is anyone familiar with the trojan horse program being sent via e-mail,
 they market themselves a LIVE SEX VIdeos, XXX Naked WOMEN, and the like,
 they send you a few pictures but in the process upload a tojan horse that
 gives them access to your phone lines resulting in mega phone bills for
 you. I understand at least one of the programs originated from Croatia or
 Moldavia >>

An article in a recient USA Today said that the US government had shut down
an organization doing these kinds of transactions.
**************************************************************************
10)From: Randy Allman 
Subject: Help!

I have been looking for a program that will use the sounds I pick up
from my hand held scanner (pageing freqs.) and will convert them into the
alpha messages or numbers they are. is there such a program?
Where can I find it?
Thanks!
Randy
**************************************************************************
11)From: rkinkopf@concentric.net
Subject: re:CMOS passwords

Michael, if you do not know the password to your CMOS, or if your
computer is the type that allows you to set a bootup password, the only
realistic way to defeat this is to remove/disconnect the small battery
that powers the CMOS.  You can find it on your motherboard, there are
many different ways to connect a battery to a motherboard, so you'll
have to find yours - some are soldered in place, others are soldered to
a cable that disconnects, and others just snap into a battery socket.

Once you have located the battery, disconnect it, wait 5 minutes, and
then reconnect it.

At this point, the computer knows nothing about itself, and it will
tell  you that there is an error in the CMOS, F2 (or something) to
correct.

You are on your own here, you will need know what type of monitor,
keyboard, hard drive, memory.....etc.  Here is where you set the
password.  (it is disabled when you remove the battery).

This is not recommended for the faint of heart.

Keep in mind, that if you want to do this to access your boss's
computer, and you get this far, you will still not know what his
password was to reset it to, so he will know that his computer has been
accessed, or you could simply disconnect the battery when you are done,
and let him think his battery went dead.

rkinkopf@concentric.net
**************************************************************************
12)From: SpyKing@thecodex.com
Subject: An Interesting Article

This has been around a while but thought it might be of interest...

Free software will transform PCs into untappable telephones

By Simson L. Garfinkel

As the U.S. Senate debates granting the Federal Bureau of Investigation new powers to wiretap personal communications, three West Coast computer programmers have planned their own pre-emptive strike; a free program, distributed on the Internet, that renders legal and illegal wiretaps useless. 

The programmers, Bill Dorsey of Los Altos, Pat Mullarky of Bellevue, Washington, and Paul Rubin of Milpitas, California, plan to release today a program that turns ordinary IBM-compatible personal computers into an untappable secure telephone. It uses an encryption algorithm called "triple-DES" that is widely believed to be unbreakable. 

"Electronic surveillance by the government is on the rise," says Dorsey, the group's lead programmer. "There also exists an equally large threat from the private sector as well: industrial espionage. Foreign governments are interested in wiretapping and getting information out of our high-tech firms." 

Called Nautilus, the program is being released as an attack on the Clinton administration's national encryption standard, the Clipper chip. Civil rights groups have criticized the Clipper initiative, since the federal government holds a copy of every chip's master key and can use that key to decrypt --
or decode -- any Clipper-encrypted conversation. But since the keys used by nautilus to encrypt conversations are created by users, the government does not have a copy. 

A nod to Jules Verne 

Nautilus has another advantage over Clipper: Whereas AT&T's Clipper-equipped Telephone Security Devices Model 3600 costs $1,100, Nautilus is a free program. 

"You don't need any special expensive hardware for it. You just use ordinary PCs," says Rubin. 

The name "Nautilus" was taken from Captain Nemo's submarine in the Jules Verne Novel, "20,000 Leagues Under The Sea." But whereas nautilus the sub was used to sink Clipper ships, the programmers hope that their creation will sink Clipper chips. 

To use Nautilus, both participants must have a copy of the program and an IBM PC-Compatible computer equipped with a Sound Blaster card and a high-speed modem. The two participants must also agree upon a series of words called a "pass phrase," which is used to encrypt the conversation. Both participants run the program and type in the pass phrase; one person instructs their computer
to place the telephone call, the other instructs their computer to answer. 

Once the call is in progress, either user must press a key on their computer in order to speak, similar to using a hand-held radio. But unlike walkie-talkies, the users can interrupt each other. 

Could help criminals

Such innovations could lead to conversations that would be practically foolproof from eavesdropping, either by pranksters or the government. It could become invaluable in future years to financial institutions and other corporations involved in sensitive negotiations. 

"It will certainly be beneficial to many citiens and many other users of it," says Jim Kallstrom, assistant director of the Federal Bureau of Investigation's New York field Office. "I would hope the extremely enterprising and smart people that we have in this country would work toward solutions that would not only protect the communcation of citizens...but would also allow the law enforcement
objectives to be maintained." 

Rubin stressed that while Nautilus was a challenge to write, it "isn't rocket science." Much of the program, in fact, was assembled from parts that already were available on the Internet, the worldwide network of computer networks. It will even be easier to construct programs similar to nautilus once Microsoft releases its computer telephony system for Windows 95. "It will be impossible to keep a program like Nautilus out of the hands of people who want it," Rubin said. 

Gene Spafford, a professor of computer science at Purdue University who is an expert on computer security, said: "It will be interesting to see what reaction this provokes from the government." Nevertheless, Spafford said, in order for encryption to be widely adopted, it will have to be "built into the phones." 

Dorsey said that anybody in the United States can download it from the computer at ripem.msu.edu or ftp.cs.org. Both of these computers have been set up so that the program cannot be downloaded by people located outside the United States. 
**************************************************************************
13)From: The Sovereign Individual 
Subject: Echelon/Oratory/Finding someone

Hello everyone!

I am back from lurking mode.

A couple of issues.  Being someone very interested in intelligence issues,
I came across some old news and new news recently.

The current issue of CAQ (Covert Action Quarterly) discusses the UKUSA
signal intelligence treaty among member nations...that being Canada, US,
UK, Australia, New Zealand and one other.  Essentially, there are six
satellites in the skies that essentially bulk download massive amounts of
communication from fax, telephone (long distance), and >e-mail< for
analysis.  The NSA has a unit that contains the ECHELON DICTIONARY which
essentially filters bulk data for KEY WORDS that they made be interested in.

These words may include: BOMB, LAUNDER, TERRORIST ACTION, etc etc.  Sorry
if I inadvertently led the NSA to our mailing list. :)  Anyhow, has anyone
heard about this and what do they think about it? It seems to me (now more
than ever) that PGP communications are essential.

Mr. Frost is also featured in the issue. He worked for the COMMUNICATIONS
SECURITY ESTABLISHMENT in Canada (Canada's NSA and now ranked near the top
for signal intelligence) and discussed a device known as the ORATORY
developed by the NSA for long distance communications. Again, this device
was used to pick keywords from massive amounts of voice data.

What else do we not know about and what can we do to avoid this nonsense?

Finding someone?

Where would I start. I used to study with this guy in university.  Have not
seen or heard of him in over 5-6 years.  I don't want an investigator as he
is not on the run or something. He did run away from his family for person
reasons. Would be curious to where he might be (used to live in Toronto,
Ontario, Canada) and what he is up to. Would not mind patching up
friendship.  Is there any legal way to get information on him so that I
could find out where he is?  He may not be in the phone listings as he may
be living under someone else who has their name in the listings...

Ideas....thanks.

T

Brought to you by:
========================================================
THE ECONOMIC INSTITUTE FOR GLOBAL CAPITALISM - Nomenklaturas
========================================================
"The monopoly over money supply will soon disappear..."
						-- Alexander S.B.
				(Member - World Future Society)
**************************************************************************
14)From: ljsaisa@algonet.se
Subject: re: Best schools? 

Re:DELEONFAM@aol.com Fri  
>Subject: Best schools?
>Hello,
>I'm looking for the best schools in Surveillance and Counter-Surveillance.
>I have 11/2 years to learn some basics about the trade before I get out of
>the Military. I would like to have enough training to enter a PI agency or
>Business Intel firm. I currently work as IS in the navy. Any help would be
>greatly appreciated. Thanks Mark.

My personal tip is that you contact P.B.A. they have one of the best traning
programs I ever seen in the civilian market. They provide courses in both UK
and the US. We do send our operatives to P.B.A. for traning, and they havn't
let us down so far....

L. J. Strand

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
15)From: PRV8EYE@aol.com
Subject: re: weekly v daily list


Subject: Need plans

I need some plans for phone color boxes, white noise generator and video
camera jammer. Can someone help.

Thanks,
Dakin
**************************************************************************
4)From: DAKIN LINILIUS 
Subject: Sprint Spectrum Wiretapped?

The feds wiretapped a friend of mines Sprint Spectrum cellular phone.
The phone is digital, they tapped both sides of the conversation and I
would like to know how they did it. The Sprint Spectrum Ad said "no one
could listen in", did they mean no one but the feds I would like to
know.

Thanks,
Dakin.

+++Moderator's Note+++

With a court order they do it at the switch... if it was court ordered your friend should recieve "paper" on it giving the details and duration of the interception... The Sprint "ads" mean "scanner buffs" can't listen in...
**************************************************************************
5)From: JoeSleuth@aol.com
Subject: Re: Best Schools?

mark try lion investigation academy  610 865 0402  est 1974, degree program
,correspondence and licensed

**************************************************************************
6)From: ljsaisa@algonet.se
Subject: Invitation to International Security Agency 

Do you have an interest in security? Then you just have to visit this 
website: < http://www.algonet.se/~ljsaisa >

Do you work in the security business? Just keep on reading about how you can
get some free promotion for your company!
----------------------------------------------------------------------------
------------------------- 
International Security Agency now introducing the "I.S.A. Security Link
Exchange".

Are you interested in joining an exclusive security / surveillance community
link exchange program with your company? The goal is to make all members
accessible to a larger group of clients.

Visit < http://www.algonet.se/~ljsaisa/linkdir/exchange.htm > to find out
what it is. For those who wants to participate in this program.  Just sign
up! Joining instructions and application form are available on the I.S.A.
web-site. IT'S TOTALY FREE!! The bill board will be updated with new members
once every week now in the begining.

The "I.S.A. Security Link Exchange Program" is an exclusive, non profitable
service to the members. On display: Your logo (50x50 pixels), Company/Org.
name, and a short company profile with a hyperlink back to your web-site.  

Our ambition is, as this new service grows on Internet, to have a large
selection of security / surveillance firms accessible on a easy to grasp
list with a short profile. This will make it easy for a potential client to
find what he/she is looking for, and make the potential contact accessible
for a larger selection of clients. 

Even if you're not interested... take a peek, you might get temted! It
dosn't cost you a dime, just 5 minutes of your time! Form for signing up on
the site!

Any questions, mail me at: < ljsaisa@algonet.se >

Sincerely yours;
I.S.A.
L. J. Strand
MD

INTERNATIONAL SECURITY AGENCY
http://www.algonet.se/~ljsaisa
ljsaisa@algonet.se
Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.)
Fax/Data: Int+46 (0)8-645 22 82 (24h)
PoBox 167, S-162 12 Stockholm, Sweden
**************************************************************************
7)From: Medic 
Subject: Re: Help?

There is a program called wintone151 that either was highlighted on this 
list or another. Anyway, I have used it and it enables the computer to 
recognized tones from a tape recorder or wav file. This program is really 
good! It works even with a lot of static and noise. 

Check it out! you won't be disapointed.
**************************************************************************
8)From: Medic 
Subject: Schematic

I an looking for a schematic diagram for a CO (carbon monoxide) detector. 
Maybe one of you guys ( or girls) who hold active subcriptions  to an  
electonic or hobby magazine can help me out. Thanks in advance.
**************************************************************************
9)From: graywolf@fox.nstn.ca
Subject: re: ECHELON  

Re: the following from alexb@echo-on.net:
e-mail< for

Subject: SFIA URL

Well, for some reason, Angelfire has reverted back to www.angelfire.com.
SO, to all Associations and anyone else that's linked to the SFIA, we are
once again at:  http://www.angelfire.com/fl/sfia/
I apologize for any inconvenience this may have caused. 
Also, we invite other PI Associations to link to and be linked from our page.

Gary Cohen   Investigator      
International Investigative Associates
Ft. Lauderdale/Pompano Beach Florida
(954) 726-9685      Pager (954)409-5599
heatgain@mindspring.com     Member-FALI & SFIA
http://www.geocities.com/WallStreet/5963/
SFIA - http://www.angelfire.com/fl/sfia/
**************************************************************************
11)From: SpyKing@thecodex.com
Subject: Re: Wiretap

>Events, tests and physical searches have proven that a telephone is being
>tapped within the Phone companys' offices. Please don't tell me I'm wrong.
>Would someone who knows tell how it might be done by an employee without the
>phone company knowing.  

What events? What tests? If a physical search proves that a telephone line is being tapped within the phone company's offices you should have found the device, right? Are you saying you found it at the phone company? How did you gain access?  
>Is there more than one location available for a physical tap? Can somebody
>program some software to make an 'invisible' tap?

If we're speaking about telephone eavesdropping, there are many ways to 
intercept conversation "anywhere" along the phone line... Private systems 
can be compromised to "ring" off-premises as well... 

>The normal channels of complaint do not work. I would like some technical
>knowledge before approaching the phone co. through some channel that wouldn't
>alert the person involved.

There is a lack of information here... you should be a little more specific if you hope to acquire help from this list... you are not giving us too much info to work with... What events? What searches? What physical search? By whom? A TSCM technician or a novice? We don't need names but we do need good info to help...
**************************************************************************
12)From: CrACKeD 
Subject: Re: Help!

> I have been looking for a program that will use the sounds I pick up
> from my hand held scanner (pageing freqs.) and will convert them into
> the alpha messages or numbers they are. is there such a program?
> Where can I find it?

The program you're looking for is called PD (POCSAG Decoder).  You can
grab a copy of the latest shareware version (2.03) from this site:

http://www.bearnet.demon.co.uk/pocsag/index.htm

You will need to construct a simple interface between your computer and
your scanner.  You can use the audio from your scanner, but it's a much
better idea to tap the discriminator output if you want to decode any more
than about 70% of the pages you receive.

I recommend you build the interface L0pht Heavy Industries sells.  It's so
small it will fit inside a DB25 hood.  Check out this site for more
information on this particular kit (also available assembled):

http://www.l0pht.com/~kingpin/pocsag.html

Other software is available and some even claims to decode pages from the
audio input of your sound card.  Don't waste your time with them though,
they hardly decode a thing.
 
CrACKeD 
**************************************************************************
13)From: "Stephen Douglas" 
Subject: New Cellular Service, a Drug Dealers dream come true?
 
Hello all,
Some of you may have heard of a new service being offered by some of 
the cellular telephone companies called pre-paid service. The plan 
works like this:

1. You get a phone.
2. You pay a $25.00 enrollment fee.
3. You buy air time in $30.00 blocks.
4. You start making phone calls (at nearly twice the normal rate).

What they don't advertise is that they don't know who you are and 
they don't want to know who you are. There is no ID check, no credit 
check and no check of any kind. When you establish the type of 
service you do fill out a small form which is purely a technicality, 
but you don't have to put down the correct info. Just to test this 
theory, I registered myself as Joeseph Blough (Joe Blow) with a 
phoney address and my pager phone number as a reference. 

Anonymous Telephone service is here at last.
Stephen Douglas K6HZT
http://www.dfsystems.com

+++Moderator's Note+++

Who's your pager registered to, you? If so, they got you if they want you...
it's also fairly easy to check calls made and backout the numbers... through 
a process of elimination I'll bet you could still be found...
**************************************************************************
14)From: Stanley Corwin 
Subject: Home Escort

Is anyone out there familiar with the BI 9000 Home Escort Monitoring 
Device? Used to monitor subjects on house arrest. Looking for frequency 
it transmits(anklet), how it contacts the central station when the 
subject is out of range, etc. Any info would be helpful.
Thank You,
Stan Corwin
Spy Store
www.spy-store.com
**************************************************************************
15)From: Trace Carpenter 
Subject: Tracking Response

>Anyways.. I'm looking for a
>tracker that can be placed in a car and will highlight where the car 
>is.
> 
>Preferably 10 square miles in range.  You know what I'm looking for, 
>the things they always show in movies which pinpoint a persons exact 
>location by a blinking dot on a computer screen..Does such a thing 
>exist or only in the movies?

Yes it does exist.  I suppose you are relatively new to the list as we 
have covered this quite extensively in the past.  You might want  to 
look at some old issues if you have them.  Anyway, a bumper beeper will 
work for you range application and if you're wanting to  possess one 
yourself, would be cheaper than the full blown tracking system like I 
use.  The better units plot the vehicle on a map on your computer.  As 
these units are rather costly, I'd suggest you contract with a local 
p.i. who already owns a system.  If you're lucky you may be in a market 
which has the teletrac or gps type system available.

-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 52


******************************************************************************
Vol.Two Issue # 52          The Surveillance List           Feb.26,1997       
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Re: Rubber Bullet Guns  
02) Several questions from a new member
03) Anonymous Telephone service  
04) Night vision goggles/scope?
05) Color Boxes Etc.
06) Re: DNA fingerprinting
 
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: CrACKeD 
Subject: Re: Rubber Bullet Guns


> Please excuse this posting if it is not appropriate for this list. I
> assume there are a large number of law enforcement personnel lurking
> here - I direct this question towards them:
> Can anyone direct me to a manufacturer of "rubber bullet guns" used for
> crowd control, anti-riot, etc.?  Any information would be greatly
> appreciated.  Thank you. 
> Joe Chapuis
> JPC@TradeBrokers.com

Do you have a 12 gauge shotgun?  If so, just buy rubber slugs or buckshot
from Phoenix Systems Inc.  You can contact them at 1-800-272-2346.  I
thought they also sold rubber rounds for common handgun calibers, but I
can't seem to find anything along those lines in their catalog.  I know
it's out there, at least.  There isn't a need for special guns unless
you're looking to use flash bangs, smokes, or chemical sprays, in which
case you should contact Gall's Inc. at 1-800-477-7766 and order a catalog.

CrACKeD 
**************************************************************************
2)From: Larry Burke 
Subject: Several questions from a new member

I shall apologize in advance for what may be the simplicity of the following
questions. I am a new subscriber, and I have no electronic background so
please bear with me.

My questions are these:

(1) In reading the comments of those who sought to assist the person who had
    forgotten their CMOS password, I was struck by the ease with which anyone
    could break into my computer system. As a result, I was wondering if there
    is an inexpensive way by which to circumvent the crippling of one's
    CMOS password by removing the battery?

(2) I am looking for an inexpensive device or plans with which to make same
    which will allow me to place in my own home a listening device attached
    to my telephone. This device I would call from my mobile phone in the car
    to activate and would allow me to be able to audio-scan my premises before
    entering it. I have been burglarized before, and I do not wish to enter
    the house if another burgler should happen to be inside.

(3) Again, I am looking for an inexpensive device or plans for same, which will
    provide any prospective caller with the information that "all telephone
    calls to this number shall be recorded." It should then give any caller
    the option to either proceed with the call or hang up. This particular
    notification process is legal in Texas.

Again I apologize if my questions are overly simplistic, but I need the
information.

PS-- I would also like a source for technical literature which will allow me
to learn how to build and/or modify electronic equipment; I have no desire to
spend 6 years in college towards this end, and I am looking for a simpler
and less time consuming approach.

PPS - I love your newsletter !!!
**************************************************************************
3)From: Jim Ray 
Subject: Anonymous Telephone service

Stephen Douglas wrote:
...
>Anonymous Telephone service is here at last.
...
>+++Moderator's Note+++
>
>Who's your pager registered to, you? If so, they got you if they want you...
>it's also fairly easy to check calls made and backout the numbers... through 
>a process of elimination I'll bet you could still be found...

The way to get around telephone tracing is to buy those prepaid cards and
also use payphones, different ones, not too close to home, every time.
This is merely a final nail in the coffin of the tax-and-spend drugwar,
the immutable laws of economics already killed it, and it's now merely
a war on freedom (and the poor) IMO. :( Others disagree, usually this
disagreement stems from paycheck source, rather than logic or ethics.
JMR
[No PGPsig because the list munges them.]

Regards, Jim Ray 

Every non-violent drug prisoner lives in a cell that could
have been used to jail Lawrence Singleton. Think about it.

http://shopmiami.com/prs/jimray/    
PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5  57 52 64 0E DA BA 2C 71
**************************************************************************
4)From: VIPER113@aol.com
Subject:  

I am looking for a real good deal on some night vision goggles/scope
(preferably goggles).  They can be used or new but I am looking for some that
cost around $50 to $100 dollars.  If anyone knows where I can get night
vision goggles at these prices either at stores or on web site shopping
places please e-mail me at VIPER113@aol.com.

Thanks,
VIPER113
**************************************************************************
5)From trace@onramp.net  
Subject: Color Boxes Etc.
 
>I need some plans for phone color boxes, white noise generator and 
>video camera jammer. Can someone help.

As I recall lopht.com has all of those.  If not let me know what you 
need and I'll see if I can put them in a *.gif file.
-- 
Trace Carpenter
214.828.4520
214.828.1917 Facsimile
**************************************************************************
6)From jamie@mail.enterprise.net
Subject: Re: DNA fingerprinting

Thanks to all the folks on the Surveillance List who responded to my "market survey" to estimate the demand for DNA fingerprinting.
It seems the big guys who do this work do indeed charge a lot. Too much!
Unfortunately, the banks felt it was too great a risk to lend me the 10 thousand bucks (or so) needed to get set up my own lab (to under cut the competition). I can see their point. The work is spotty (no pun intended).

Anyway, along with my previous letter Spyking said

>Prof. Love, tell us more...I'm sure the PI's on this list will be more than interested... 

OK.
Starting with Spyking's question about a reciprocating justice for sexual indiscretions...

>Wouldn't it also make sense that male undergarments could be examined
also for the presence of female (secretions)DNA? (an additional potential
market)

Nope.
Semen is a great thing to leave behind at the scene. Millions of years of evolution has turned semen into the best damn DNA delivery system going (or is that "coming"?).
It's full of DNA. And only an EXTREMELY hygienic woman could prevent her undergarments from collecting the microscopic amount of material needed for today's techniques.
Conversely, female sexual secretions (nice as they are!) have very few cells and thus very little DNA.
Therefore, it is VERY unlikely that he will arrive home with some of her DNA.
Sorry ladies. Life is unfair. (And you've heard it from a professional biologist!)
On the otherhand, "who does this strand of hair belong to?" is a more likely (and traditional) way to catch him. And if the hair has the "bulb" intact (the part that's in the head) it could be DNA "printed". Regardless of what kind of hair it was of hers
!
My library research on the subject (as I prepared my business plan) turned up some nice nuggets about the technique which I thought the List may find interesting.

DNA fingerprinting from cig-buts!
In a retrospective forensic study, some folks fingerprinted the DNA from a group of cig-buts found at the crime (murder) scene. A set of "prints" on one but matched that of the victim (at least he didn't die of cancer!).
Another set was from the guy who is locked up for the murder (good catch). And a third set was from a still unidentified person who may have been a mere passer-by or .....?
The remarkable thing about his study is that it was done with material collected from the crime scene 18 years ago!

DNA fingerprinting from stamps and envelopes!
This is soooo cool!
In a controlled study scientists found they could collect and fingerprint the DNA from as little as a drop of saliva left behind on a stamp or envelope seal. A paper-punch-hole plug (you know, those circles you get when you make holes in paper to put it into a binder) is all you need. Only the DNA from the person who did the licking was detected. That is, they had one guy lick it and another guy stick it on the envelope. Each time, the DNA they fingerprinted belonged to licker not the sticker! They even passed it around the lab and to the secretary "to simulate postal handling in the USA", and always IDed the licker.
I wouldn't trust a stamp to identify the writer of a letter. 
(Have you ever asked someone to "put a stamp on this and mail it for me, will ya?")

But the envelope seal would likely be licked by the writer.
("Seal this envelope for me, will ya?" Hmmm, I don't think so.)
With corporate espionage on my mind, I was thinking that this could be used as a modern day "wax seal" like kings used to prove they had sent the letter. 
I have no idea of the full utility of stamp DNA for forensics, PI or industrial security, but maybe you have an idea.

That's enough for now. 
If the List wants more info (general or otherwise) let me know. 

Jamie Love (PhD, MBA)	Scientist for Hire	"Life is my business"
jamie@enterprise.net	http://homepages.enterprise.net/jamie/sci4hire
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************



Vol 2 Issue # 53


******************************************************************************
Vol.Two Issue #53          The Surveillance List            Feb.28,1997        
                        Over 1400 Members Worldwide
******************************************************************************
IN THIS ISSUE...
******************************************************************************
01) Some Investigative ideas for beginners  
02) Re: CMOS passwords  
03) Real-Time DTMF Decoder for Windows 95  
04) Re: Several questions from a new member
05) Re: Several questions from a new member
06) THANKS FOR ALL  
07) fingerprint identification
08) scanner modiyed?
09) Night Vision
10) Open Letter to a List Member
11) Several Questions Response
12) Vehicle location Device
13) Tempest
14) TSCM needed   
15) wireless surveillance equipment
16) A word of appreciation
17) Telephone Rerouting
18) Re: Wiretapped

  
******************************************************************************
DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT
******************************************************************************
1)From: BADCOFFEE@aol.com
Subject: Some Investigative ideas for beginners

Hey, I will never answer the question that is asked of me "Are you a PI?". I
go around the question..let em wonder....

I am (shh!) a "newbie". I love this stuff. I help people when I can. Now...it
is tme to start adding adtional FOOD to my table. My question that Plaigued
me was : "ok...HOW??". There are REAL pro's out there. I can ever compete
with them..."or can I"  

Looking for the easy way out...taking my time to MASTER skills, I had a
fantastic Idea today...... When i was in a accident (not my fault) 3 years
ago....the cop..botched the accident report...and the schetch looked like a 2
year old had extra time and paper. I PISSED away 8 months of my time trying
to cinvince insurance companies that I was INNOCENT and THEY needed to
compensate me. 
How many time did I say "MAN! I I only Had a Picture??!!  How many accidents
did you pass this week? ONE picture...get police report, has addresses on it.
Advise you got a picture of accident, YOU decide what its worth.  

Let me know people if you got any other CREATIVE ideas for the "newbies" 
Badcoffee@aol.com
**************************************************************************
2)From: gizmo4@ix20.ix.netcom.com
Subject: Re: CMOS passwords

I have a crack for the passwords in the CMOS, picked it up from the 
Cavren.  Its 32 bit though.  38.8 k, K-cmos32.zip.  Email me if you 
need a copy.  As CrACKed said you'll need to reconfigure the settings 
in CMOS
**************************************************************************
3)From: Richard Smerker 
Subject: Real-Time DTMF Decoder for Windows 95

I just wanted to let the list readers know about a 
potentially useful utility.

WinTone is an application which takes input from 
your Windows sound card and converts all audible
DTMF tones to readable digits and gives you the
option to log them.  The detection is very reliable,
and will work even under noisy conditions.

It also has DTMF Triggers so that you can launch an
external program or start recording to WAV file when
a pre-defined series of tones is heard.  Imagine
the possibilities.

WinTone also doubles as a Scanner Monitor, recording
incoming audio to a WAV file only when "Squelch" is
broken.  It will decode DTMF tones while in this 
mode as well.  Great for unmanned Surveillance.

All you need is a 486 or faster machine (For the 
DTMF decoding) and Windows 95 or NT with a sound
card installed.  No Hardware on serial ports - 
It is a total SOFTWARE solution.  I invite you to
check it out :

http://www.frii.com/~rsmerker/html/programs.html

Rich Smerker - N0WOY
Steak Sandwich Software
rsmerker@frii.com
**************************************************************************
4)From: CrACKeD 
Subject: Re: Several questions from a new member


> (1) In reading the comments of those who sought to assist the person who
> had forgotten their CMOS password, I was struck by the ease with which
> anyone could break into my computer system. As a result, I was
> wondering if there is an inexpensive way by which to circumvent the
> crippling of one's CMOS password by removing the battery?

Simply physically secure the machine.  You could drill two holes between
both ends of the chassis and case and secure the machine together with a
pair of high-quality locks (magnetic "keys" are always fun).  Combine this
with a decent cabled security system and your machine will neither leave
without your desk attached.  If it does, it's not going to open without
help from a blow torch or bolt cutters.  You may consider encrypting your
non-removable drives with something like Secure Drive or KOH to satisfy
any remaining paranoia, but be sure to have backups some place if you do.

> I am looking for an inexpensive device or plans with which to make same
> which will allow me to place in my own home a listening device attached
> to my telephone. This device I would call from my mobile phone in the
> car to activate and would allow me to be able to audio-scan my premises
> before entering it. I have been burglarized before, and I do not wish to
> enter the house if another burgler should happen to be inside.

Information Unlimited sells such a device for about $60.  Here's a quote
from their catalog:

	SNOOPER PHONE LISTENER	
	Electronic module connects to phone, allows you to monitor
	such premises as vacation homes, office warehouses.  Use
	car phone for alerting of home intruder, ambushes etc.
	Simple to use. Dial target phone, and listen in.

Sounds like it'll work for you.  Check out Information Unlimited on the
web at www.amazing1.com.

> Again, I am looking for an inexpensive device or plans for same, which
> will provide any prospective caller with the information that "all
> telephone calls to this number shall be recorded." It should then give
> any caller the option to either proceed with the call or hang up. This
> particular notification process is legal in Texas.

Take the simple and inexpensive route.  Record a message something
like this on your answering machine:

"All calls on this line are recorded.  If you disagree with this policy,
hang up now.  Otherwise, speak after the tone and your call will be
answered if possible."

Set the machine to activate after one or two rings and it'll work fine.

HTH, as simple as it may be.

CrACKeD 
**************************************************************************
5)From: DELEONFAM@aol.com
Subject: Re: Several questions from a new member

Please Forward this to Several questions from a new member.
I just recieved a catalog from Phoenix Systems Inc. They have exactly what
you described. The item is called Telephone Surveillance Monitor (#1113). It
is priced at 169.95. 

Phoenix System, INC.
P.O BOX 3339
EVERGREEN, CO 80437
MONDAY-FRIDAY 8a.m -5p.m (Mtn time)

ORDER ONLY 1-800-272-2346
FAX 303-278-8101

Product Information & Inquires
303-277-0305. 

I hope this helps. MD.
**************************************************************************
6)From: JoeSleuth@aol.com
Subject: THANKS FOR ALL  

THANKS FOR ALL THOSE PROFESSIONALS WHO RESPONDED TO LION INVESTIGATION
ACADEMY AD.  YOULL ENJOY THE COURSE AND EARN A BONAFIDE DEGREE IN THE PRIVATE
SECTOR ITS ABOUT TIME WE PROFESSIONALIZE THIS SECTOR       1 800 637 7507
**************************************************************************
7)From: "Preston F. Powell" 
Subject: fingerprint identification

Maybe someone can help me. I'm looking for some basic algorithms created 
to analysis and provided basic fingerprint identification. Does any one 
know the names, and places to where such information may be obtained?

		Thanks for the help
**************************************************************************
8)From: kevina@citynet.net
Subject: scanner modiyed? 
 

i need my scanner modiyed in the 800mhz band, if you can do this email asap.
thanks , kevina@citynet.net
**************************************************************************
9)From: jake01@juno.com (Brent L Sodders)
Subject: Night Vision
 
Unless someone posts differently,  I believe most night vision will run
you 300-400 dollars.  A place that may be a bit cheap[er but not sure
about their quality would be
the Edge Co. @ 1-800-732-9976.

May be a bit cheaper, however always be weary of cheap prices on
electronics unless a new series has bumped the latest one off the top of
the demand list.

You also may want to contact someone with a military connection, or a
large police dept looking to sell old equipt. for new.
**************************************************************************
10)From: Ed Wheeler 
Subject: Open Letter to a List Member
 
Several weeks ago, I requested assistance in locating several companies in the UK.  I received an immediate reply from Mr. Timothy Robarts of Hands-On Ltd in London.  

I would like to openly thank him and his fine company for the fast and effective results that they provided.  It is so seldom you find a company that has the ability to be effective, responsive, resourceful and internationally correct, that I thought it should be given the proper response and especially to those on the List, who may have a similiar need for their services.  They have more than satisfied our requirements and I highly recommend them for your future needs.

So to Mr. Timothy Robarts and  Hands-On Ltd. a hearty  Thank You and  Well Done from all of us at NCP.

Ed Wheeler
Chief of Security
National Computers Plus, Inc.
Tulsa, OK. 74147
Home of the worlds fastest workstation ----  See it at www.ncpi.com  
**************************************************************************
11)From: Trace Carpenter 
Subject: Several Questions Response
 
Hi Larry:

First, welcome to the list.  I noticed you too are in Texas.  Drop me an 
e-mail and let me know where you are.

On your first question about CMOS, the news is not good.  For anything 
you did to protect a regular CMOS, someone would defeat it.  On the 
other hand, a friend of mine at one time was burning his own chips with 
a password on them so it  wasn't in memory.  The problem with that is 
you have to solder the chip to the board to keep someone from just 
changing the chip.

As for monitoring your house from the car phone, since you stated you 
don't have an electronics background I'd recommend calling a good alarm 
company.  They have that option on burglar alarms built into your house 
and they work very well.  If you were looking for a more covert 
application let me know.

Now about recording your calls and notifing callers.  First a standard 
RadShk trip switch and a recorder will work for your application.  If 
you were in a covert situation I'd say to stay away from their equipment 
as it's easily detected.  For your described situation however, it'll 
work just fine.

A quick note though.  Texas is a one party concent state.  In other 
words, you do not have to notify the other party.  As long as one party 
to the conversation (you) know it's being recorded, it's legal.  The 
exception to that rule is if you're an attorney.  The Texas state bar 
has an openion that doing this is unethical for an attorney to do.  It's 
still perfectly legal from a law standpoint though as far as Texas is 
concerned.
-- 
Sincerely,

Trace Carpenter

Trace Carpenter Investigations       Professional Private Investigations
660 Amberton Tower                          Suspicions Confirmed
4144 N. Central Expy.                         Problems Solved !
Dallas, Texas 75204                          Free Consultations
214.828.4520
214.828.1917 Facsimile

**************************************************************************
12)From: Ron Smalley 
Subject: Vehicle location Device

Some while ago,  Someone on the list reported on a GPS module coupled to a
transmitter to report vehicle location.
At that time I had little interest in such a device, so did not save the
information. However I have since  been approached
for a device for policing delivery trucks. Does anyone know of a proprietry
device ?. It seems to me that such a device
could be fitted to a vehiles RT, the location being reported at the release
of the "send" switch, or be triggered by an address
tone.
In this case I could be contacted directly rather than bore list members
with repeat stuff
Kind Regards to all subscribers,
Ron Smalley
rons@ns.planet.gen.nz
**************************************************************************
13)From: "Peter J. Lasky" 
Subject: Tempest

Can anyone tell me or send me some plans on how to make a tempest 
box. I read the articles on the codex homepage but it wasn't specific 
enough. I need it to at least do 300 yards, if possible. This is for 
educational purposes. Thanks Pete
E-mail: Pete@akoe.com
********************MaFia CReW*********************
This letter brought to you by GooDFeLLa. I am the
founder of the MiDNiGHT MaFia. Though we are few
and not named for anything, we still know what we
are doing. E-MaiL Pete@akoe.com
(Join the family at HTTP://www.enteract.com/~akopete)
**************************************************************************
14)From gary.smith@wmcmail.wmc.ac.uk  
Subject: TSCM needed 

I would like to find out the name of any company that will do a surveillance sweep on my friends property. He lives in the Merseyside area of the UK. The price is a factor and so if anyone can furnish me with a price list also will be a great help
**************************************************************************
15)From: Bob Waller 
Subject: wireless surveillance equipment
  
I am looking for information concerning any laws, codes...etc
that pertain to the use of wireless surveillance equipment by
law enforcement in California. My interest is in the area of
altered Part 15 devices, home made units, power limitations
authorized frequencies and unlicensed operation. This would be
be for State and Local agencies, not the Feds. The concern is
that evidence gathered thru this medium may be challenged due
to the type of equipment that was used.

Thanks in advance for any assistance that you may offer

Bob Waller
Orange County Fire Authority
Orange, California
**************************************************************************
16)From: Larry Burke 
Subject: A word of appreciation

Hello all,

I would like to take just a moment to express my sincere appreciation to
everyone who took the time from their busy schedules to respond to my
inquiry. All suggestions and comments and advice are very much appreciated
and shall be most useful.

Sincerely,

Larry
**************************************************************************
17)From: Hermilo Cardenas Guajardo 
Subject: Telephone Rerouting

I'm looking for an equipment that can forward a telephone call.
Let me explain.

I want to make a call at line #1 connected at this equipment, then this equipment answerme and conect me at line #2 to make a call in that line.

If any body knows were can I get this stuf,  let me know !!!!

All ideas welcome

Thanks 
**************************************************************************
18)From: Wilgetum@aol.com
Subject: Re: Wiretapped

This phone line is completely visible inside and clear to the telephone pole.
The phone line goes underground less than a block away. (Can't see any
'extra' connections along this visible stretch of line)

The Ph. co says there is no problem along this line and their 'capacitance'
check indicates no tap. They also say they have checked 'internally'.

Events? This bus.' enemies are doing things which can only happen if they are
privy to info which has been discussed over the phone.

I might add that the Ph. Co. doesn't believe me either, but I DID ASK how an
employee could tap the phone without the Phone Co. knowing. Dammit, if Joe
works for the Phone Co.; is tapping a phone and his boss asks him to check
out a tapping complaint, what do you expect Joe to say?

This is why I need to approach Joe through some other route within the Phone
Co., but I would like to be better informed.

Wilgetum  
**************************************************************************
 
Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... 
Do you have something to contribute? We'd like to hear it... 

We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... 

Do you have a question? Post it... A little free time? Help a member...

With the INCREDIBLE brain power on this list, someone should have the answer ;-) 

P.S. Don't be a LURKER... Members take the time to post info for us all... 
give something back... Don't just take... Your input/knowledge is valued...

**************************************************************************
Send Postings to: 6886@mne.net with "Post" in subject field with subject
**************************************************************************
Subscribe to: 6886@mne.net
In the subject field type: subscribe-surveillance list e-mail address
**************************************************************************
Unsubscribe to: 6886@mne.net
In the subject field type: unsubscribe-surveillance list e-mail address  
**************************************************************************
...The Simple Rules of the Surveillance List...

The Surveillance List Owners may Reject any posts that are/contain:

1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 
2) Flames or Negative posts... 
3) E-Signatures that are considered excessive... 
4) Advertisements not DIRECTLY related to the list topics...
5) Attached Files...
6) Oversized Posts... (May be edited to save room)
****************************************************************************
This publication is copyrighted and is protected by U.S. and 
International copyright law. The information transmitted on this 
list may not be reproduced, reposted or forwarded to any non-list 
member without expressed written permission of the List Owner.
Violation of U.S. copyright law is a criminal and civil offense...
****************************************************************************   
The Surveillance List is moderated by SpyKing@thecodex.com
The List Owner will make EVERY effort to protect subscribers from spam...
Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved...
****************************************************************************